Trusted

A New Malware Is Hijacking Computers to Secretly Mine Monero (XMR)

2 mins
Updated by Mohammad Shahid
Join our Trading Community on Telegram

In Brief

  • A new virus called H2Miner is secretly using people’s computers to mine Monero (XMR) without permission.
  • It spreads through software bugs, disables antivirus, and installs hidden scripts to keep coming back even after removal.
  • Some versions also lock up the system with ransomware, making the computer unusable until fixed.
  • promo

A dangerous botnet called H2Miner has resurfaced. It hijacks computers to secretly mine Monero (XMR) and, in some cases, deploys ransomware.

Cybersecurity researchers say the malware has expanded since it first appeared in 2019. The new version now targets Linux servers, Windows desktops, and cloud containers.

A Silent Virus Could Be Using Your Computer For Crypto Mining

According to cybersecurity firm Fortinet, attackers gain access by exploiting known software vulnerabilities. These include Log4Shell and Apache ActiveMQ, which many systems still use.

Once inside, the virus installs a tool called XMRig, a legitimate open-source miner

But instead of asking for permission, it runs in the background, using your computer’s processing power to earn Monero for the hackers.

Also, H2Miner uses smart scripts to disable antivirus tools. It also kills other miners that may already be running on the system.

Then, it wipes any trace of its actions. On Linux, it installs a cron job that redownloads the malware every 10 minutes. 

On Windows, it sets up a task that runs silently every 15 minutes.

Message From Hackers After Taking Over User Systems. Source: Fortinet

A Ransomware Twist Adds More Damage

The virus doesn’t stop at crypto mining. A new payload, called Lcrypt0rx, can also lock up your computer.

It uses a simple but destructive method to overwrite the Master Boot Record—a key part of your computer that controls startup. This can prevent the system from booting properly.

The ransomware also adds fake system settings to hide itself and create persistence.

The campaign takes advantage of cheap cloud servers and misconfigured services. Once a machine is infected, the malware scans for other systems to infect—especially Docker containers and cloud platforms like Alibaba Cloud.

It also spreads through USB drives and loops through antivirus processes, killing them off one by one.

Security experts warn that removing H2Miner requires a deep cleanup. You must delete all related cron jobs, scheduled tasks, and registry entries.

If even one hidden script survives, the botnet can reinstall itself and resume mining Monero in secret.


What Traders and Crypto Users Should Know

This attack isn’t targeting crypto wallets directly. Instead, it steals computing power to generate new Monero coins for the attackers.

The risk is especially high for self-hosted nodes, cloud miners, and unmanaged VPS services.

If your system runs hot or slows down unexpectedly, you might want to check for unusual processes like sysupdate.exe or recurring outbound connections.

Monero’s privacy features make it attractive for attackers. But for users, the real risk is losing control of your devices—and unknowingly funding crypto crime.

Top crypto platforms
Top crypto platforms

Disclaimer

In adherence to the Trust Project guidelines, BeInCrypto is committed to unbiased, transparent reporting. This news article aims to provide accurate, timely information. However, readers are advised to verify facts independently and consult with a professional before making any decisions based on this content. Please note that our Terms and ConditionsPrivacy Policy, and Disclaimers have been updated.

mohammad.png
Mohammad Shahid
Mohammad Shahid is an experienced crypto journalist with a specialization in blockchain security. He covers a wide range of topics spanning everything from Web3 to retail crypto. As an experienced freelance journalist, he has worked on campaigns for several tier-1 exchanges, such as Bitget, and startups, including RankFi and HAQQ. Mohammad comes from an extensive technical background, with a master’s degree in Cyber Security Analysis from Macquarie University, where he majored in...
READ FULL BIO
Sponsored
Sponsored