Close Menu
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
What's Hot

Lawmakers Warn Crypto Clarity Will Decide U.S. Leadership as 2026 Election Looms

April 29, 2026

Visa is teaming up with a Tether co-founder to build onchain banks

April 29, 2026

DEXE: Short pressure builds as price nears $12.8 – What now?

April 29, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
CryptoPulseDaily.com
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
CryptoPulseDaily.com
Home»Security and Privacy»Crypto-Miners Take Out Supercomputers Working on #COVID19
Crypto-Miners Take Out Supercomputers Working on #COVID19
Security and Privacy

Crypto-Miners Take Out Supercomputers Working on #COVID19

July 27, 2023No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Supercomputers across Europe appear to have been targeted by cryptocurrency miners over the past few days, forcing offline key IT resources working on COVID-19 research.

One of the first to report problems was the University of Edinburgh’s Archer supercomputer, which was taken offline last Monday after “a security exploitation on the Archer login nodes.”

Working with the National Cyber Security Centre (NCSC), the institution has been forced to rewrite all existing passwords and SSH keys. It is still down at the time of writing.

The Computer Security Incident Response Team (CSIRT) at the European Grid Infrastructure (EGI) organization revealed two potentially related security incidents in an analysis on Friday. In both, a malicious actor was blamed for targeting academic data centers for CPU mining.

“The attacker is hopping from one victim to another using compromised SSH credentials,” it explained.

The attackers were logging in from three compromised networks, at the University of Krakow in Poland, Shanghai Jiaotong University and the China Science and Technology Network. It has been claimed that some credentials are shared between academic institutions, making it easier for would-be attackers.

It’s also claimed that the attackers are exploiting CVE-2019-15666 for privilege escalation before deploying a Monero cryptocurrency miner.

Other institutions affected by the campaign include the Swiss Center of Scientific Computations (CSCS), the bwHPC, which runs supercomputers across the German region of Baden-Württemberg, the University of Stuttgart’s HPE Hawk machine, the Leibniz Computing Center (LRZ) and an unnamed facility in Barcelona.

“What’s interesting about this is that it seems hackers have targeted the supercomputers completely remotely for the first time, as before there has always been an insider who installs the crypto-mining malware used for the attack,” argued ESET cybersecurity specialist, Jake Moore.

See also  US Goes After Crypto Criminals

“All the SSH login credentials will now need resetting, which may take a while, but this is vital to stop further attacks. Once a list of credentials is compromised, it is a race against time to have these reset. Unfortunately, the lead time is usually enough of a head start for threat actors to take advantage of the mining software.”

Source link

COVID19 Cryptominers Supercomputers working
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 28, 2026

US Sanctions Target Cambodian Scam Network Leaders

April 27, 2026

OpenAI’s new image model shows why crypto scams are about to get much worse

April 26, 2026

For 93 minutes, installing Bitwarden’s ‘official’ CLI turned laptops into launchpads for hijacking GitHub accounts

April 24, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Ubisoft’s Rabbids Invade Reddit as Free NFTs

May 28, 2023

Analyzing if ATOM’s price is ready for a 15% rally on the charts now

April 4, 2026

Binance delists privacy coins for European users amid layoff rumors

June 4, 2023

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Crypto, ICOs, Web3, Blockchain and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Lawmakers Warn Crypto Clarity Will Decide U.S. Leadership as 2026 Election Looms

April 29, 2026

Visa is teaming up with a Tether co-founder to build onchain banks

April 29, 2026

DEXE: Short pressure builds as price nears $12.8 – What now?

April 29, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Crypto Pulse Daily - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Cleantalk Pixel
  • bitcoinBitcoin(BTC)$76,582.000.32%
  • ethereumEthereum(ETH)$2,295.090.57%
  • tetherTether(USDT)$1.00-0.01%
  • rippleXRP(XRP)$1.37-0.69%
  • binancecoinBNB(BNB)$620.87-0.38%
  • usd-coinUSDC(USDC)$1.00-0.01%
  • solanaSolana(SOL)$83.810.12%
  • tronTRON(TRX)$0.323055-0.11%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.030.29%
  • dogecoinDogecoin(DOGE)$0.1057926.87%