Server from the HP brand kidnapped to reduce cryptocurrency worth $ 110,000-

Server from the HP brand kidnapped to reduce cryptocurrency worth $ 110,000-

Hacker has recently taken control of a group of HP servers and used them to minel a cryptocurrency called Raptoreum from afar. This resulted in the compromised cluster of HP machines made the largest contribution to the entire mining pool of cryptocurrency, so that attackers could achieve a value of $ 110,000. The coins are said to have been dismantled between December 9th and 17th.

HP Server suffer cryptojacking attacks

A group of HP servers who work for an unknown company was attacked of hackers who managed to take control of the hardware and reuse them for mining cryptocurrencies. The crypto chosen by the hackers was called Raptoreum, A Coin among the top 1,000 after market capitalization, which uses an algorithm called Ghostrider, the Pow (proof-of-work) and POS (proof-of-stake) combines consensus mechanisms.

The server cluster started on December 9th with the mining of raptoreum and at that time delivered more hash power than all other parties together on the raptoreum blockchain. As a result, the attackers were able to collect raptoreum worth more than $ 110,000 in the period between 9 and 17 December.

The server group disappeared from the Raptoreun network on December 17, an indication that it could have been patched to remove the threat after it has been recognized.

Log4j Leveraged

The attack used a recently discovered weak point called Log4Shell, which enables attackers to get control of a system from afar. Log4SHELL uses Log4J, a registration library that is widespread in Apache-based systems. This weak point was discovered in early December and used in this case to pass the execution of crypto mining software.

The weak point was classified as critical by its discoverers because it is often used, even when it comes to massive operations such as Microsoft and IBM. Although the software has been patched in some of its implementations, investigators still discover new opportunities to use it. It was recently discovered that the software is also susceptible to local attacks, which means that the server can carry out code from a distance without being connected to the Internet.

In the first half of this year, cryptojacking attacks have according to a. For the first time since 2018 with the title "Cloud thread Report ”, published by Unit 42, a security consultant. In a follow-up point, however, the law firm also that 63 % of the code templates of third-party providers used when building a cloud infrastructure become uncertain configurations that could lead to the loss of control over the hardware.

What do you think of the HP brand attack to reduce raptoreum? Tell us in the comment area below.

sergio@bitcoin.com '

sergio goschenko

sergio is a cryptocurrency journalist based in Venezuela. He described himself as late at the game and entered the cryptosphere when the price increase took place in December 2017. With a background in computer technology that lives in Venezuela and is affected by the cryptocurrency boom at the social level, it offers a different view of the crypto success and how it helps the non-banks and under-sector.

Bedy verification : Shutterstock, Pixabay, Wiki Commons