Friday, March 21, 2025
HomeSecurity NewsRussian Scientists arrested for using Secret Nuclear Weapons Lab Supercomputer to Mine...

Russian Scientists arrested for using Secret Nuclear Weapons Lab Supercomputer to Mine Bitcoin

Published on

SIEM as a Service

Follow Us on Google News

Russian Scientists arrested for using All-Russian Research Institute of Experimental Physics supercomputers to mine bitcoins secretly. The institute was located in the city of Sarov, Nizhny Novgorod region.

Now the crypto miners are detained by authorities and a criminal charge was filed against the researchers involved in mining. They were handed over to the authorities and their names are not disclosed in public.

“Indeed, there was an attempt to unauthorized use of office computing capacities for personal purposes, including for so-called mining,” Tatyana Zalesskaya, head of the research institute press service, told to Russian Media Interfax on Friday.

It is one of the oldest facility in Russia and nuclear researchers are carried out here starting from 1946.The facility has more than 20,000 employees and the supercomputer that is capable of performing 1,000 trillion calculations per second.

Similar attempts have recently been registered in a number of large companies with large computing capacities, which will be severely suppressed at our enterprises, this is technically a hopeless and criminal offense,” Zalesskaya noted.

Russia is one of the largest resources of electric power producer and exporters in the world, low-cost energy may make the mining more attractive in Russia.Couple of Aleksey Kolesnik a Russian Bussiness man bought two power plants for mining cryptocurrency.

Bloomberg reported that Young Russians now prefer to give as gifts server farms rather than diamonds, Deputy Finance Minister Alexey Moiseev said earlier this year.

Last week a 17-year-old schoolboy was arrested by Japanese police expecting to be the author of a Malware that steals Cryptocurrency Monacoin wallet Private key passwords.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Over 150 US Government Database Servers Vulnerable to Internet Exposure

A recent open-source investigation has uncovered one of the largest exposures of US government...

Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

A concerning development has emerged with the active exploitation of Apache Tomcat servers through...

UAT-5918 Hackers Exploit N-Day Vulnerabilities in Exposed Web and Application Servers

A recent cybersecurity threat, identified as UAT-5918, has been actively targeting entities in Taiwan,...

MEDUSA Ransomware Deploys Malicious ABYSSWORKER Driver to Disable EDR

In a recent analysis by Elastic Security Labs, a malicious driver known as ABYSSWORKER...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps

A recent study conducted by Dutch IT security consultancy Modat has revealed alarming vulnerabilities...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...