Article Details
Scrape Timestamp (UTC): 2024-01-14 02:28:23.481
Original Article Text
Click to Toggle View
Hacker spins up 1 million virtual servers to illegally mine crypto. A 29-year-old man in Ukraine was arrested this week for using hacked accounts to create 1 million virtual servers used to mine $2 million in cryptocurrency. As announced today by Europol, the suspect is believed to be the mastermind behind a large-scale cryptojacking scheme that involves hijacking cloud computing resources for crypto-mining. By using the computing resources of others' servers to mine cryptocurrency, the cybercriminals can profit at the expense of the compromised organizations, whose CPU and GPU performance is degraded by the mining. For on-premise compromises, the damage extends to having to pay for increased power usage, commonly generated by miners. A 2022 report from Sysdig estimated the damage from cryptojacking to be about $53 for every $1 worth of Monero (XMR) the cybercriminals mine on hijacked devices. Europol says they first learned of the cryptojacking attack in January 2023 from a cloud service provider who was investigating compromised cloud accounts on their platform. Europol, the Ukrainian police, and the cloud provider worked together to develop operation intelligence that could be used to track down and identify the hacker. The police say they arrested the hacker on January 9th, when they seized computer equipment, bank and SIM cards, electronic media, and other evidence of illegal activity. A separate report by the Ukrainian cyberpolice explains that the suspect has been active since 2021 when he used automated tools to brute force the passwords of 1,500 accounts of a subsidiary of one of the world's largest e-commerce entities. Europol and Ukraine have not identified the e-commerce company or its subsidiary. The threat actor then used these accounts to gain access to administrative privileges, which were used to create more than one million virtual computers for use in the cryptomining scheme. The Ukrainian authorities confirmed that the suspect was using TON cryptocurrency wallets to move the illegal proceeds, with transactions equal to roughly $2 million. The arrested individual now faces criminal charges under Part 5 of Art. 361 (unauthorized interference in the work of information, electronic communication, electronic communication networks) of the Criminal Code of Ukraine. Mitigating the risk Threat actors commonly target cloud services to hijack computing resources for illegal cryptocurrency mining. Methods to defend against cryptojacking attacks include monitoring for unusual activity like unexpected spikes in resource usage, implementing endpoint protection and intrusion detection systems, and limiting administrative privileges and access to critical resources only to those needing them. Cryptojackers often exploit documented flaws in cloud platforms to achieve an initial compromise. So, regularly applying the available security updates on all software is crucial to protecting systems against external threats. Finally, all administrative accounts should have 2FA enabled in case their credentials are stolen.
Daily Brief Summary
A 29-year-old man in Ukraine was arrested for orchestrating a cryptojacking scheme that illegally mined cryptocurrency using 1 million virtual servers.
Europol disclosed that the suspect hijacked cloud computing resources, significantly impacting the CPU and GPU performance of the victimized organizations.
The cybercriminals profited by siphoning computing power to mine $2 million worth of cryptocurrency, at great expense to compromised entities in increased power usage.
The criminal activity was uncovered in January 2023 by a cloud service provider who noticed compromised accounts, leading to a collaborative investigation with law enforcement.
The operation used brute-force attacks to gain administrative privileges on compromised accounts, dating back to activity starting in 2021.
Europol and Ukrainian police, through their investigation, seized evidence including computer equipment and electronic media linked to the cryptojacking activities.
The suspect used TON cryptocurrency wallets for transactions of the illegally obtained funds.
Counties are recommended to strengthen their cloud security measures, including regular monitoring for abnormal usage patterns, applying software updates, utilizing 2FA for administrative accounts, and employing intrusion detection and endpoint protection systems.