Two Russians Prosecuted for Mining Crypto on Government Computers

Tuesday, 17/12/2019 | 10:38 GMT by Arnab Shome
  • Criminal cases were brought against the perpetrators.
Two Russians Prosecuted for Mining Crypto on Government Computers
Finance Magnates

The Russian authorities have prosecuted two citizens of the country for illegally mining digital currencies on computers of state organizations.

Reported by local media outlet TASS on Monday, the two perpetrators were targeting computer hardware of state organizations to mine Cryptocurrencies using web browsers.

Though the report did not reveal the identity of the perpetrators, it detailed that one of the charged is is a resident of Kurgan, who used almost a whole botnet in various regions of the country, while, in the second case, a criminal case was initiated on the fact of using the site of JSC Rostovvodokanal for mining.

Addressing a press conference on Monday, Nikolay Murashov, deputy director of the National Coordination Center for Computer Incidents, said: “In Russia, there have been two cases recently when people were brought to criminal responsibility for getting access to computers [of state organizations] and using them to mine cryptocurrencies.”

A profitable illegal activity

He also pointed out that the high electricity cost and the ability to mine digital currencies using normal computers are behind the rising number of illegal cryptocurrency mining activities.

In addition, he also pointed out the excessive utilization of processing power, causing degradation of the performance of the computers, resulting in a massive loss of affected businesses.

“Up to 80% of the computer’s free power can be used to generate virtual coins, and a legitimate user may not even know about it,” Murashov added.

Due to the associated profits, Cryptojacking has become very popular among hackers, and they are evolving tactics to deceive programs to detect their activities. Finance Magnates recently reported that hackers are using process hollowing techniques to hide crypto mining activities on victims' computers. Meanwhile, another popular botnet malware - Stantinko - also turned to crypto mining and is using YouTube to evade detection.

The Russian authorities have prosecuted two citizens of the country for illegally mining digital currencies on computers of state organizations.

Reported by local media outlet TASS on Monday, the two perpetrators were targeting computer hardware of state organizations to mine Cryptocurrencies using web browsers.

Though the report did not reveal the identity of the perpetrators, it detailed that one of the charged is is a resident of Kurgan, who used almost a whole botnet in various regions of the country, while, in the second case, a criminal case was initiated on the fact of using the site of JSC Rostovvodokanal for mining.

Addressing a press conference on Monday, Nikolay Murashov, deputy director of the National Coordination Center for Computer Incidents, said: “In Russia, there have been two cases recently when people were brought to criminal responsibility for getting access to computers [of state organizations] and using them to mine cryptocurrencies.”

A profitable illegal activity

He also pointed out that the high electricity cost and the ability to mine digital currencies using normal computers are behind the rising number of illegal cryptocurrency mining activities.

In addition, he also pointed out the excessive utilization of processing power, causing degradation of the performance of the computers, resulting in a massive loss of affected businesses.

“Up to 80% of the computer’s free power can be used to generate virtual coins, and a legitimate user may not even know about it,” Murashov added.

Due to the associated profits, Cryptojacking has become very popular among hackers, and they are evolving tactics to deceive programs to detect their activities. Finance Magnates recently reported that hackers are using process hollowing techniques to hide crypto mining activities on victims' computers. Meanwhile, another popular botnet malware - Stantinko - also turned to crypto mining and is using YouTube to evade detection.

About the Author: Arnab Shome
Arnab Shome
  • 7307 Articles
  • 133 Followers
About the Author: Arnab Shome
Arnab Shome is an electronics engineer-turned-financial editor. He holds a Bachelor of Technology from the National Institute of Technology, Agartala. He entered the retail trading industry about a decade ago, covering the cryptocurrency market for Finance Magnates, and later expanded his coverage to include forex and CFDs as well. His work at Finance Magnates includes C-level interviews, data-driven analysis, opinion pieces, and scoops of industry exclusives. He also contributes to Finance Magnates’ quarterly industry report. Area of coverage: 1. CFD broker-related news 2. Industry-related Regulatory updates and developments 3. New retail trading trends 4. Prop trading industry updates 5. Executive interviews Education: Bachelor of Technology - National Institute of Technology, Agartala (India)
  • 7307 Articles
  • 133 Followers

More from the Author

CryptoCurrency

!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|} !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}