#cryptocurrency-mining

[ follow ]
DevOps
fromTheregister
3 days ago

Illicit crypto-miners pouncing on insecure DevOps tools

Up to 25% of cloud users at risk of having resources exploited for cryptocurrency mining.
Attackers exploit misconfigurations in DevOps tools, particularly targeting open-source applications.
JINX-0132 identified as the threat actor behind the campaign.
Publicly accessible applications are vulnerable to attacks, especially when insecurely configured.
#cybersecurity
Tech industry
fromThe Hacker News
3 months ago

Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers

ISPs in China and the US West Coast are under a coordinated exploitation campaign by unidentified threat actors stealing data and mining cryptocurrencies.
Tech industry
fromThe Hacker News
3 months ago

Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers

ISPs in China and the US West Coast are under a coordinated exploitation campaign by unidentified threat actors stealing data and mining cryptocurrencies.
Startup companies
fromFast Company
1 month ago

This old mine in rural Pennsylvania was used to power crypto-and then it shut down without a word

Diversified Energy's crypto mining operations have raised concerns over environmental impacts due to their abandonment of gas wells without proper permits.
#energy-consumption
[ Load more ]