Loading...

HP servers hijacked to mine $110,000 worth of cryptocurrency

TL;DR

TL; DR Breakdown

  • A set of HP nodes were hijacked and used for Raptoreum crypto mining.
  • The thieves mined up to $110000 of Raptoreum during the heist.

Cyberpunks broke into a collection of HP systems belonging to an unnamed enterprise. They seized command of the gear, redirecting it to generate virtual currency. Besides, the cybercriminals chose raptoreum, a token in the best 1,000 by enterprise value. Raptoreum uses the Ghostrider algorithm. The algorithm combines PoW (proof-of-work) and PoS (proof-of-stake) concord techniques.

On 9th Dec, the backend bunch began generating Raptoreum. Yet, at that point, it had greater hash strength compared to other users on the Raptoreum network merged. From 9th Dec to 17th Dec, the perpetrators collected over $110,000 in raptoreum due.

On 17th Dec, the host unit vanished from the Raptoreun blockchain. Thus, it signals an update to neutralize the malware after its discovery.

Log4j leveraged

The assault preyed on a newly found loophole known as Log4shell. The virus enables criminals to seize command of a device. Log4shell utilizes Log4j, a database library frequently utilized in Apache-based applications. They figured the weakness around December. Nonetheless, they used it to bypass the activation of crypto-mining malware.

The flaw has already been indexed as significant by its explorers for its widespread use. Large corporations such as Microsoft and IBM are relying on it for help. Even though parts of the system’s variants are under modification, analysts find new uses.

The program is considered susceptible to local threats. This means that the systems may run code despite not being hooked to the net.

The Log4J flaw is way severe. It lets intruders access a protected machine. Also, it retrieves information and executes the malicious script without gaining direct access. Raptoreum is made on a Proof-Of-Work (PoW) design that employs the GhostRider algorithm. They designed the algorithm for core systems and are immune to ASIC devices. An HP 9000 system using AMD EPYC systems has a specific goal.

HP features attracted the hackers

Due to its enormous L3 hoard, GhostRider utilizes an AMD mainframe. Due to the 256 MB of buffer on forms with 32 or above cores, the Crypto is quite lucrative on AMD’s costly Epyc node CPUs. This is what inspired the deviants to pick HP operators. The Raptoreum’s engineers realized it was 9000-series. Also, it employs Epyc processors in an analytic examination.

The cybercriminals sold a bunch of it on CoinEx. It was roughly $110,000, yet the price of the retained half has since plunged. The residual shares are available in the account. Thus, indicating that the criminals are hoping for the Crypto to soar in price.

As per research named “Cloud Thread Report” published by Unit 42 (a security consultancy business), Cryptojacking assaults have declined from 2018. But, the organization made a discovery. In a close analysis, 63 percent of third-party programming models used in cloud computing had vulnerable setups. And this may result in losing the equipment.

Share link:

Dennis Mugambi

Dennis is a content writer with a deep understanding of the blockchain domain and cryptocurrency field. He infuses cold data with flair to make technology and finances mind-blowing. His reports both fascinate and awaken the readers.

Most read

Loading Most Read articles...

Stay on top of crypto news, get daily updates in your inbox

Related News

Grand Base
Cryptopolitan
Subscribe to CryptoPolitan