Geeks for your information
Two crypto-mining groups are fighting a turf war over unsecured Linux servers - Printable Version

+- Geeks for your information (https://www.geeks.fyi)
+-- Forum: News (https://www.geeks.fyi/forumdisplay.php?fid=105)
+--- Forum: Privacy & Security News (https://www.geeks.fyi/forumdisplay.php?fid=107)
+--- Thread: Two crypto-mining groups are fighting a turf war over unsecured Linux servers (/showthread.php?tid=6979)



Two crypto-mining groups are fighting a turf war over unsecured Linux servers - silversurfer - 10 May 19

Quote:Two hacker groups are fighting to take control over as many Linux cloud-based environments as they can so they can use server resources to mine cryptocurrency behind owners' backs.
 
This turf war has been secretly going on since late last year, ever since the rise of a new hacker group named Pacha, which was pretty successful at challenging Rocke --the top hacker group specialized in Monero crypto-mining operations.
 
Both groups operate mass-scanning operations that look for open or unpatched cloud services and servers to infect them with a multi-functional Linux-based malware strain.
 
The most aggressive of the two is, by far, the smaller Pacha group, which adopted a strategy of removing a long list of known crypto-mining malware strains on each server it infected.
Using this approach, Pacha hackers have slowly carved out a large piece on the crypto-mining scene.

And according to a report published today, the Pacha Group paid special attention to identifying and removing versions of Rocke's miner, most likely in an attempt to eat away at its rival's "market share."

SOURCE: https://www.zdnet.com/article/two-crypto-mining-groups-are-fighting-a-turf-war-over-unsecured-linux-servers/


RE: Two crypto-mining groups are fighting a turf war over unsecured Linux servers - Deep900 - 12 May 19

The main problem of cryptomining is that they could spoil hardware components of systems. Unfortunately because of they permit to earn money cryptominers are largely used nowadays. Those group of hackers could access forcely to the system, go ahead and get a more complete access to the servers and then start their malicious activities.