Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » 29-Year-Old Ukrainian Cryptocurrency Hijacking Leader Arrested for Exploiting Cloud Services
    Cyber Security

    29-Year-Old Ukrainian Cryptocurrency Hijacking Leader Arrested for Exploiting Cloud Services

    techempireBy techempire3 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 13, 2024Editorial DepartmentCryptojacking/Cloud Security

    Cryptojacking

    A 29-year-old Ukrainian citizen has been arrested for running a “sophisticated cryptocurrency hijacking scheme” that brought them more than $2 million (€1.8 million) in illicit profits.

    After “months of close cooperation” and with support from Europol and an unnamed cloud service provider, the Ukrainian National Police arrested the man on January 9 in Mykolayev, Ukraine.

    “A cloud provider approached Europol as early as January 2023 to provide information about the theft of its cloud user accounts,” Europol said, adding that it had shared the intelligence with Ukrainian authorities.

    As part of the investigation, police searched three properties to identify evidence against the suspects.

    Internet security

    Cryptojacking is a type of cybercrime that involves the unauthorized use of a person’s or organization’s computing resources to mine cryptocurrency.

    In the cloud, such attacks typically involve compromising credentials obtained through other means to infiltrate the infrastructure and install miners that exploit the processing power of the compromised host to mine cryptocurrency without the compromised host’s knowledge or consent.

    Microsoft noted in July 2023: “If the credentials do not have the permissions the threat actor requires, privilege escalation techniques will be used to gain additional permissions. In some cases, threat actors will hijack existing subscriptions to further obfuscate their operate.”

    The core idea is to conduct cryptojacking attacks by exploiting free trials or compromising legitimate tenants, thus avoiding paying for the necessary infrastructure required to mine cryptocurrency.

    In October 2023, Palo Alto Networks Unit 42 detailed a cryptojacking campaign in which threat actors were discovered to have stolen Amazon Web Services (AWS) credentials from a GitHub repository within five minutes of publicly disclosing information used to mine Monero .

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.