Tagged articles
20 articles
Page 1 of 1
21CTO
21CTO
Apr 21, 2025 · Information Security

Hidden VSCode Extensions Deploy Crypto Miners: What Developers Must Know

A recent security report reveals that ten malicious Visual Studio Code extensions, disguised as popular tools, install PowerShell loaders that persist, disable defenses, and deploy XMRig miners, highlighting a classic third‑party supply‑chain attack and urging developers to tighten defenses.

SecuritySupply ChainVSCode
0 likes · 7 min read
Hidden VSCode Extensions Deploy Crypto Miners: What Developers Must Know
Efficient Ops
Efficient Ops
Nov 26, 2021 · Information Security

How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and What to Do

A self‑built Kubernetes cluster suffered a crypto‑mining intrusion due to empty iptables and a misconfigured kubelet, prompting a detailed post‑mortem that outlines the symptoms, root‑cause analysis, and practical hardening steps to protect similar environments.

crypto miningfirewallincident response
0 likes · 5 min read
How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and What to Do
Java High-Performance Architecture
Java High-Performance Architecture
Oct 20, 2021 · Information Security

How a Misconfigured Kubelet Led to Crypto Mining on Our Kubernetes Node – Lessons Learned

After discovering a suspicious process on one of our self‑built Kubernetes nodes, we traced the intrusion to a misconfigured kubelet that exposed the API, allowing attackers to run a Monero mining script, and we outline the investigation steps and hardening measures to prevent similar breaches.

KubernetesSecuritycrypto mining
0 likes · 6 min read
How a Misconfigured Kubelet Led to Crypto Mining on Our Kubernetes Node – Lessons Learned
MaGe Linux Operations
MaGe Linux Operations
Jun 24, 2021 · Information Security

Inside a Crypto Mining Botnet: Step-by-Step Server Compromise Analysis

This article walks through a real-world server breach where attackers hijacked SSH access, deployed malicious scripts, leveraged Redis vulnerabilities, and turned the machine into a high‑speed crypto‑mining botnet, while offering detailed forensic clues and remediation advice.

Linux securitycrypto mininggpg-agentd
0 likes · 12 min read
Inside a Crypto Mining Botnet: Step-by-Step Server Compromise Analysis
Programmer DD
Programmer DD
Apr 22, 2021 · Information Security

How Hackers Hijack GitHub Actions to Run Free Crypto Mining

Hackers exploit GitHub Actions by submitting malicious pull requests that add hidden workflows, downloading and executing crypto‑mining binaries on GitHub’s free servers, a technique that has spread to other CI platforms and poses a persistent security challenge.

CI/CD securityContainer SecurityGitHub Actions
0 likes · 9 min read
How Hackers Hijack GitHub Actions to Run Free Crypto Mining
ITPUB
ITPUB
Apr 13, 2021 · Information Security

How Hackers Hijack GitHub Actions to Run Free Crypto Mining

Amid soaring cryptocurrency prices, hackers exploit GitHub Actions by submitting malicious pull requests that run hidden XMRig mining code on GitHub’s free CI servers, a technique detailed through a French developer’s investigation, code analysis, attack scale, and mitigation advice.

GitHub ActionsSecurityXMRig
0 likes · 11 min read
How Hackers Hijack GitHub Actions to Run Free Crypto Mining
macrozheng
macrozheng
Nov 26, 2020 · Information Security

Recovering a Server Hijacked by a Crypto‑Mining Virus: My Step‑by‑Step Fix

After my small 1‑CPU, 2 GB server was compromised by a crypto‑mining virus that hijacked SSH access, I used VNC to investigate, identified malicious processes, traced infected files, removed cron jobs, restored system utilities, repaired SELinux, and closed the Redis vulnerability to fully recover the machine.

LinuxRedis vulnerabilitySSH
0 likes · 10 min read
Recovering a Server Hijacked by a Crypto‑Mining Virus: My Step‑by‑Step Fix
21CTO
21CTO
Mar 17, 2020 · Information Security

When Ops Turn Rogue: Inside Baidu’s 2018 Crypto‑Mining Scandal

A Baidu operations engineer illegally mined cryptocurrency on more than 150 company servers in 2018, netting over 100,000 RMB, was caught, sentenced to three years in prison and a fine, and the case now serves as a stark reminder of insider threats and the need for strict access controls in IT operations.

Operations Riskcrypto mininginformation security
0 likes · 7 min read
When Ops Turn Rogue: Inside Baidu’s 2018 Crypto‑Mining Scandal
Efficient Ops
Efficient Ops
Jan 29, 2019 · Information Security

How Hackers Hijacked a Server with Hidden Accounts and Crypto‑Mining: A Forensic Walkthrough

This article details a multi‑stage server compromise that injected gambling pages, planted hidden accounts, deployed crypto‑mining software, and opened unnecessary ports, providing step‑by‑step forensic analysis, code inspection, emergency response actions, and indicators of compromise.

crypto miningincident responseinformation security
0 likes · 12 min read
How Hackers Hijacked a Server with Hidden Accounts and Crypto‑Mining: A Forensic Walkthrough
ITPUB
ITPUB
Jan 17, 2018 · Information Security

How ISPs Hijack Video Sites to Run Hidden Crypto‑Mining Scripts

Recent reports show that some Chinese ISPs inject obfuscated cryptocurrency‑mining JavaScript into popular video‑streaming pages, using network hijacking to exploit browsers' CPU cycles without noticeable slowdown, and security tools like 360 Safe Guard now offer anti‑mining protection.

Browser SecurityCoinHiveISP hijacking
0 likes · 6 min read
How ISPs Hijack Video Sites to Run Hidden Crypto‑Mining Scripts
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Aug 20, 2017 · Information Security

How a Web‑Ad Trojan Exploits IE to Deploy Crypto Mining

Tencent's security lab uncovered a large‑scale trojan spread via pornographic web ads that exploits the CVE‑2016‑0189 IE vulnerability, installs a backdoor, and runs a Zcash mining program, while also distributing Linux malware and controlling numerous C&C servers across Chinese provinces.

CVE-2016-0189IE vulnerabilitycrypto mining
0 likes · 8 min read
How a Web‑Ad Trojan Exploits IE to Deploy Crypto Mining