Threat Actor Profile
Description
Rocke is an alleged Chinese-speaking adversary whose primary objective appeared to be cryptojacking, or stealing victim system resources for the purposes of mining cryptocurrency. The name Rocke comes from the email address "rocke@live.cn" used to create the wallet which held collected cryptocurrency. Researchers have detected overlaps between Rocke and the Iron Cybercrime Group, though this attribution has not been confirmed.(Citation: Talos Rocke August 2018)
Confidence Score
Known Aliases
Tags
First Seen
Unknown
Last Updated
Unknown
Active Status
ActiveCreated
April 29, 2026
MITRE ATT&CK Techniques (36)
Indicators of Compromise
Loading IOCs…
IOC KQL for Sentinel
STIX Data
{'aliases': ['Rocke'],
'created': '2020-05-26T14:20:20.623Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': '[Rocke](https://attack.mitre.org/groups/G0106) is an alleged '
'Chinese-speaking adversary whose primary objective appeared '
'to be cryptojacking, or stealing victim system resources for '
'the purposes of mining cryptocurrency. The name '
'[Rocke](https://attack.mitre.org/groups/G0106) comes from the '
'email address "rocke@live.cn" used to create the wallet which '
'held collected cryptocurrency. Researchers have detected '
'overlaps between '
'[Rocke](https://attack.mitre.org/groups/G0106) and the Iron '
'Cybercrime Group, though this attribution has not been '
'confirmed.(Citation: Talos Rocke August 2018)',
'external_references': [{'external_id': 'G0106',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/groups/G0106'},
{'description': 'Liebenberg, D.. (2018, August 30). '
'Rocke: The Champion of Monero '
'Miners. Retrieved May 26, 2020.',
'source_name': 'Talos Rocke August 2018',
'url': 'https://blog.talosintelligence.com/2018/08/rocke-champion-of-monero-miners.html'}],
'id': 'intrusion-set--44102191-3a31-45f8-acbe-34bdb441d5ad',
'modified': '2025-04-25T14:49:08.821Z',
'name': 'Rocke',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'spec_version': '2.1',
'type': 'intrusion-set',
'x_mitre_attack_spec_version': '3.2.0',
'x_mitre_deprecated': False,
'x_mitre_domains': ['enterprise-attack'],
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_version': '1.0'}