Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Gov’t Servers in South Korean City ‘Infected with Crypto Mining Malware’
Tim Alper
Last updated:
January 15, 2024 06:30 EST | 2 min read
Disclosure: Crypto is a high-risk asset class. This article is provided for informational purposes and does not constitute investment advice. By using this website, you agree to our terms and conditions. We may utilise affiliate links within our content, and receive commission.
Source: iuliia_n/AdobeCrypto mining malware has been found on two government servers in the South Korean city of Daejeon, an audit has found.
Per MBN, the nation’s Ministry of Public Administration and Security commissioned biannual audits of the city government’s servers.
During the most recent audit, in June last year, auditors found that Daejeon City’s “information was infected with malicious code.”
The code, they said was “used for purposes such as virtual currency mining.”
They said that one of the compromised servers was “infected with” mining malware that made use of “exposed” administrator account passwords.
Another server, they said, had been used “as a hacking transit point.” The point allowed attackers to “further infect” the network with crypto mining malware.
The city’s cyber response team said they had detected “abnormal” activities “within eight days.”
The team then quarantined the network and discovered the malicious code. It then reported details to the National Intelligence Service (NIS).
The NIS is South Korea’s top intelligence agency, and deals with breaches of public data.
The auditors, however, stated that a lack of “additional security measures” had allowed hackers to strike with impunity.
Security ‘Oversights’ Let Crypto Miners Hack South Korean Servers?
The audit team noted that the city had failed to use “secure” administrator account password protection.
And the team said that 98 of the city’s 467 information server devices had “not undergone necessary annual diagnostic checks.”
The ministry ordered the Daejeon Mayoral Office to “thoroughly carry out related work” to “prevent the recurrence of similar cases in the future.”
In 2021, citizens in Seoul were shocked by the news that a government employee had been using city-provided energy to mine Ethereum (ETH) underneath the country’s most prestigious opera house.
Inspectors found the two ETH mining rigs with sophisticated graphics cards. The devices were connected to power outlets in a basement under the opera house’s Calligraphic Art Museum.