Former government contractor avoids jail for mining crypto at work

Published at: Sept. 20, 2020

A former government contractor in Australia who mined crypto using state-owned supercomputers has avoided jail time. 

According to The Sydney Morning Herald, Jonathan Khoo was ordered to complete 300 hours of community service for installing code on two supercomputers run by Australia’s Commonwealth Scientific and Industrial Research Organisation, or CSIRO, to mine cryptocurrency. 

Khoo was able to mine AU$9,420 worth of cryptocurrencies and deposited these to his Ethereum and Monero wallets in 2018. 

CSIRO, which conducts scientific and technological research for the Australian government, said Khoo’s actions diverted needed computing power and cost the agency AU$76,668. Australian federal cybercrime authorities said by using supercomputers for personal gain, Khoo had taken valuable resources from studies into climate change, pulsar data array analysis and medical research. 

Khoo’s mining activity was discovered in February 2018 and he was dismissed from his employment. Charges of unauthorized modification of data to cause impairment came a year later. The maximum penalty is 10 years in prison.

This is not the first time authorities had to deal with employees using supercomputers at work to mine crypto. In 2019, a scientist and former employee of Russia’s nuclear facility used the agency’s supercomputers to mine Bitcoin. He was sentenced to three years and three months in prison and fined 200,000 roubles ($3,130 at the time). Two other collaborators were fined.

Tags
Related Posts
Monero Cryptojacking Malware Targets Higher Education
According to a study published by Guardicore Labs, a malware botnet known as FritzFrog has been deployed to ten millions of IP addresses. The malware has largely targeted governmental offices, educational institutions, medical centers, banks, and telecommunication companies, installing a Monero (XMR) mining app known as XMRig. Guardicore Labs explains that FritzFrog uses a brute-force attack on millions of addresses to gain access to servers. That’s where an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. After it gets in it proceeds to run a separate process named “libexec” to execute XMRig. “It has successfully …
Technology / Aug. 20, 2020
Researchers Detect Crypto-Mining Worm to Steal AWS Credentials
Cybersecurity researchers have detected what they believe to be the first ever stealth crypto mining campaign to steal Amazon Web Services (AWS) credentials. The mining campaign was described as being relatively unsophisticated by Cado Security in their report on Aug. 17. In total, it seems so far to have only resulted in the attackers — who operate under the name TeamTNT — pocketing a paltry $300 in illicit profits. What struck the researchers’ attention was the crypto-mining worm’s specific functionality for stealing AWS credentials. Cado Security understands this as part of a wider trend, showing that hackers and attackers are …
Technology / Aug. 18, 2020
‘Invisible God’ Amassed Millions Selling Corporate Data
A new report shows that a Kazakhstani hacker built a million dollar fortune by breaching private networks and selling their data. Researchers at threat intelligence company, Group-IB, said that the hacker, who operates under the pseudonym “Fxmsp,” began promoting their services across darknet. They posted data for sale on hacking-related forums, offering valuable resources stolen from private corporate networks. Some customers have taken to calling the hacker “The invisible god of networks.” Millionaire profits for Fxmsp According to the report, the magnitude of Fxmsp’s cybercriminal business is enormous. They reportedly accumulated $1.5 million in profits over three years by targeting …
Technology / June 24, 2020
Devs at Blogging Platform Ghost Take Down Crypto-Mining Malware Attack
Developers at blogging platform Ghost have spent the past 24 hours fighting a crypto mining malware attack. Announced in a status update on May 3, the devs revealed that the attack occurred around 1:30 a.m. UTC. Within four hours, they had successfully implemented a fix and now continue to monitor the results. No sensitive user data compromised Yesterday’s incident was reportedly carried out when an attacker targeted Ghost’s “Salt” server backend infrastructure, using an authentication bypass (CVE-2020-11651) and directory traversal (CVE-2020-11652) to gain control of the master server. The Ghost devs have said that no user credit card information has …
Technology / May 4, 2020
Researchers Detect Ambitious Bitcoin Mining Malware Campaign Targeting 1,000s Daily
Cybersecurity researchers have identified a persistent and ambitious campaign that targets thousands of Docker servers daily with a Bitcoin (BTC) miner. In a report published on April 3, Aqua Security issued a threat alert over the attack, which has ostensibly “been going on for months, with thousands of attempts taking place nearly on a daily basis.” The researchers warn: “These are the highest numbers we’ve seen in some time, far exceeding what we have witnessed to date.” Such scope and ambition indicate that the illicit Bitcoin mining campaign is unlikely to be “an improvised endeavor,” as the actors behind it …
Technology / April 6, 2020