Server from the HP brand kidnapped to reduce cryptocurrency worth $ 110,000-
Server from the HP brand kidnapped to reduce cryptocurrency worth $ 110,000-

HP Server suffer cryptojacking attacks
A group of HP servers who work for an unknown company was attacked of hackers who managed to take control of the hardware and reuse them for mining cryptocurrencies. The crypto chosen by the hackers was called Raptoreum, A Coin among the top 1,000 after market capitalization, which uses an algorithm called Ghostrider, the Pow (proof-of-work) and POS (proof-of-stake) combines consensus mechanisms.
The server cluster started on December 9th with the mining of raptoreum and at that time delivered more hash power than all other parties together on the raptoreum blockchain. As a result, the attackers were able to collect raptoreum worth more than $ 110,000 in the period between 9 and 17 December.
The server group disappeared from the Raptoreun network on December 17, an indication that it could have been patched to remove the threat after it has been recognized.
Log4j Leveraged
The attack used a recently discovered weak point called Log4Shell, which enables attackers to get control of a system from afar. Log4SHELL uses Log4J, a registration library that is widespread in Apache-based systems. This weak point was discovered in early December and used in this case to pass the execution of crypto mining software.
The weak point was classified as critical by its discoverers because it is often used, even when it comes to massive operations such as Microsoft and IBM. Although the software has been patched in some of its implementations, investigators still discover new opportunities to use it. It was recently discovered that the software is also susceptible to local attacks, which means that the server can carry out code from a distance without being connected to the Internet.
In the first half of this year, cryptojacking attacks have according to a. For the first time since 2018 with the title "Cloud thread Report ”, published by Unit 42, a security consultant. In a follow-up point, however, the law firm also that 63 % of the code templates of third-party providers used when building a cloud infrastructure become uncertain configurations that could lead to the loss of control over the hardware.
What do you think of the HP brand attack to reduce raptoreum? Tell us in the comment area below.
Bedy verification : Shutterstock, Pixabay, Wiki Commons