Saturday, December 28, 2024
HomeComputer Security16 Person Hacker Group Arrested for Mining Cryptocurrency at Internet Cafes

16 Person Hacker Group Arrested for Mining Cryptocurrency at Internet Cafes

Published on

SIEM as a Service

Police arrested 16 person hacker group for illegally mining cryptocurrency at Internet cafes. The hacker group compromised thousands of system in more than 30 cities across the country and earned more than 5 million yuan worth ($800,000).

How Attackers Installed Crypto Miners

The hacker group conducted a well-planned operation to deploy the Cryptocurrency miners in computers at Internet Cafes.

Liu Hua is the administrator of the criminal gang designed the mining procedures, Zhou Mou and Xiong Mou work in Internet Cafes and they promoted the mining programs. An unnamed computer service company used their privileges on access to computers to deploy the miners.

- Advertisement - SIEM as a Service

Liu an Internet cafe owner first spotted the abnormal resource usage and the same situation experienced by other Internet cafes in the city and they reported to Ruian police.

https://twitter.com/ummjackson/status/1008569453586604037

Ruian police detected the hidden mining program that runs automatically on all the computers and mines Siacoin “After an investigation, the computer maintenance of all affected Internet cafes are invariably undertaken by a computer maintenance company. The person in charge of the company, Ruan Zou, who is 35 years old was arrested.” reports hangzhou.

Still, the investigation is in progress, now the malware spread across more than 30 cities in China and more than 100 computer maintenance firms in the country being allegedly involved.

Cryptomining attacks are increasing rapidly, attackers use to compromise servers, personal computers, Chrome extensions and web portals to mine cryptocurrencies such as Monero.

The Internet oldest hacker group Rex Mundi who was active from 2012 was taken down in joint operation supported by the Europol and the Joint Cybercrime Action Taskforce (J-CAT).

Also Read

Ex-CIA Employee Charged for Leaking Powerful CIA Hacking Tools to WikiLeaks

Largest Dark Web Marketplace Black Hand Shut Down By Authorities

New Android RAT Spotted in Wild Abusing Telegram Protocol for Command and Control

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...

Best SIEM Tools List For SOC Team – 2024

The Best SIEM tools for you will depend on your specific requirements, budget, and...