Dogecoin is brought up to our attention one again, this time a hacker mined around 500 million dogecoins, equating to $200 thousand. The hackers infiltrated gegevens storage hubs for laptop networks. According to SecureWorks, which is an information service and is a subsidiary of Dell, the hacker targeted NAS (network linked storage) boxes which wij made by Synology Inc. It used the boxes’ power to mine dogecoins on a private pool. The hacker wasgoed running the miners for months and since then customers have bot complaining about poor quality of service on Facebook way back ter February.
SecureWorks who wasgoed compromised said:
“To date, this incident is the single most profitable, illegitimate mining operation.”
the investigation discovered a folder named ‘PWNED’ that ocntained the miner which ran on the boxes. It used CPUMiner ter order to mine the coins. The hacker did not choose the standard cgminer which uses GPUs to mine because the boxes seemed to have a strong CPU with minimal GPU spectacle. This way he wasgoed able to use a puny amount of the CPU’s power to go unnoticed.
The address that the dogecoins were sent to is
The address shows around 400 million dogecoins, the other wallet contains the surplus of the coins that make up harshly 500 million doges.
Who wasgoed it?
SecureWorks is set on finding out who the hacker wasgoed and so far exposed that “the findings strongly indicate that the threat actor is of German descent.”
The hacker also used a private pool ter order to mine the coins this talent the hacker the anonymity he desired because since the pool is wielded by the hacker it will not release his account’s logs. This eliminates evidence that could listig the hacker to his identity.
SecureWorks also accessed the gegevens being sent to the NAS boxes and were able to ascertain the dogecoin wallet address holding the fraudulently mined coins.
Inwards the configuration verkeersopstopping for the CPUminer the string foilo.root3 shows up to have a listig to an account on GitHub and BitBucket, if charges are going to be filed the police could subpoena the two companies to expose logs about the account and it’s IP addresses. Then they could verbinding it to the hacker’s identity. If the hacker used a VPN or Proxies or if the hacker simply used that name to divert investigators he could be safe.
Not the very first attack
This dogecoin mining attack represents a creative treatment to generating cryptocurrency through fraudulent means. The more classic treatment is the use of a Botnet and installing miners on the infected computers, however infiltrating powerful corporate computers is a more creative way to treatment it.
Another example of such an attack happened last month, where unknown hackers attempted to distribute bitcoin mining malware through the torrent of the popular spel Witness Dogs, this attack wasgoed targeted at torrent users who thought they could could play the spel for free, ironically their rekentuig’s were infected.
Another attempt wasgoed aimed at cellphone users who downloaded wallpaper apps, one such app made it to the Google Play app store which installed mining software on the user’s devices.
Don’t leave behind to go after us on twitter for giveaways @btc_feed