Cyber security news for all

More

    Ukrainian National Apprehended for Masterminding a $2 Million Cryptojacking Operation

    In a significant crackdown on cybercrime, a 29-year-old from Ukraine has been arrested for orchestrating a lucrative cryptojacking scheme. The scheme reportedly amassed over $2 million (€1.8 million) through illicit means.

    The Ukrainian mastermind was detained in the city of Mykolaiv on January 9, following a collaborative effort involving the National Police of Ukraine, Europol, and a major cloud service provider. This arrest was the culmination of months of intensive investigative work.

    Europol revealed that the initial tip-off came from a cloud provider in January 2023, after detecting suspicious activities in compromised user accounts. This intelligence was promptly shared with Ukrainian law enforcement agencies.

    From the cybersecurity perspective, Ukraine’s Cyber Police disclosed that the American company’s servers were infected with a mining virus by the suspect. The attack dates back to at least 2021, utilizing custom-made brute-force tools to breach around 1,500 user accounts of the company.

    The hacker reportedly manipulated these accounts to control the service and established over one million virtual computers to facilitate the malware’s operation. In the course of the investigation, three properties were searched to gather incriminating evidence against the individual.

    Cryptojacking, a cybercrime involving the unauthorized use of computing resources to mine cryptocurrencies, is often executed in the cloud by accessing infrastructure through stolen credentials. The aim is to leverage the processing power of the infected hosts for mining cryptocurrencies without the owner’s knowledge or consent.

    Microsoft, in a report from July 2023, highlighted that attackers often escalate privileges when the initially obtained credentials don’t grant the desired access. The tactics also include hijacking existing subscriptions to conceal their activities.

    This method allows cybercriminals to evade the costs associated with mining infrastructure, exploiting free trials or hijacking legitimate accounts. A notable instance of such a strategy was detailed by Palo Alto Networks Unit 42 in October 2023, where attackers swiftly mined Monero using Amazon Web Services (AWS) credentials pilfered from GitHub repositories.

    This article was updated to incorporate additional information from the Cyber Police of Ukraine.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]