Europe’s supercomputers hijacked by attackers for crypto mining

728
Supercomputers hijacked by attackers for crypto mining
Supercomputers hijacked by attackers for crypto mining

Europe’s supercomputers hijacked by attackers for crypto mining

Supercomputers hijacked by attackers for crypto mining. At least a dozen supercomputers across Europe have shut down after cyber-attacks tried to take control of them. “A security exploitation” disabled access to the Archer supercomputer, at the University of Edinburgh, on 11 May. A pan-European supercomputing group says they tried to use the machines to mine cryptocurrency.

Staff said they were working with the National Cyber Security Centre to restore the system, which had recently installed a pandemic modelling tool.

Online Internship with Certification

Important Announcement – EasyShiksha has now started Online Internship Program “Ab India Sikhega Ghar Se


How EasyShiksha Internship/Training Program Works
How EasyShiksha Internship/Training Program Works

“We now believe this to be a major issue across the academic community as several computers have been compromised in the UK and elsewhere in Europe,” the team said.

The NCSC said: “We are aware of this incident and are providing support.

“The NCSC works with the academic sector to help it improve its security practices and protect its institutions from threats.”

Also on 11 May, another attack shut down five supercomputers in Germany. Others followed elsewhere in Germany in the following days, as well as in Switzerland, and reportedly Barcelona.


Top Courses in Computer Science Engineering

Top Courses in Software Engineering

Loading...

More Courses With Certification


They exploited an Secure Shell (SSH) connection, which academic researchers use to log in to the system remotely.

And once inside, the attackers appear to have deployed cryptocurrency-mining malware.

The security team at the European Group Infrastructure foundation said: “A malicious group is currently targeting academic data centres for CPU [central processing unit] mining purposes.

“The attacker is hopping from one victim to another using compromised SSH credentials.”

Empower your team. Lead the industry

Get a subscription to a library of online courses and digital learning tools for your organization with EasyShiksha

Request Now

Frequently Asked Questions

Jamie Akhtar, chief executive of UK security company Cybersmart, said: “Universities are home to some of the most advanced research projects in the world across many disciplines – including computer science – but they are also notoriously vulnerable to attack if they are connected to the wider university network.”

I hope you like this blog, Supercomputers hijacked by attackers for crypto mining.  To learn more visit HawksCode and Easyshiksha.

 

ALSO READ: chemistry-breakthrough-could-speed-up-drug-development

Get Course: autodesk-fusion-360-robot-and-cad-designer

 

Download this article as PDF to read offline: