Monday, November 25, 2024
HomeComputer Security16 Person Hacker Group Arrested for Mining Cryptocurrency at Internet Cafes

16 Person Hacker Group Arrested for Mining Cryptocurrency at Internet Cafes

Published on

Police arrested 16 person hacker group for illegally mining cryptocurrency at Internet cafes. The hacker group compromised thousands of system in more than 30 cities across the country and earned more than 5 million yuan worth ($800,000).

How Attackers Installed Crypto Miners

The hacker group conducted a well-planned operation to deploy the Cryptocurrency miners in computers at Internet Cafes.

Liu Hua is the administrator of the criminal gang designed the mining procedures, Zhou Mou and Xiong Mou work in Internet Cafes and they promoted the mining programs. An unnamed computer service company used their privileges on access to computers to deploy the miners.

- Advertisement - SIEM as a Service

Liu an Internet cafe owner first spotted the abnormal resource usage and the same situation experienced by other Internet cafes in the city and they reported to Ruian police.

https://twitter.com/ummjackson/status/1008569453586604037

Ruian police detected the hidden mining program that runs automatically on all the computers and mines Siacoin “After an investigation, the computer maintenance of all affected Internet cafes are invariably undertaken by a computer maintenance company. The person in charge of the company, Ruan Zou, who is 35 years old was arrested.” reports hangzhou.

Still, the investigation is in progress, now the malware spread across more than 30 cities in China and more than 100 computer maintenance firms in the country being allegedly involved.

Cryptomining attacks are increasing rapidly, attackers use to compromise servers, personal computers, Chrome extensions and web portals to mine cryptocurrencies such as Monero.

The Internet oldest hacker group Rex Mundi who was active from 2012 was taken down in joint operation supported by the Europol and the Joint Cybercrime Action Taskforce (J-CAT).

Also Read

Ex-CIA Employee Charged for Leaking Powerful CIA Hacking Tools to WikiLeaks

Largest Dark Web Marketplace Black Hand Shut Down By Authorities

New Android RAT Spotted in Wild Abusing Telegram Protocol for Command and Control

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...

Best SIEM Tools List For SOC Team – 2024

The Best SIEM tools for you will depend on your specific requirements, budget, and...

Oracle Releases Biggest Security Update in 2024 – 372 Vulnerabilities Are Fixed – Update Now!

Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities...