Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Just add humans: Oxford medical study underscores the missing link in chatbot testing

    Do reasoning models really “think” or not? Apple research sparks lively debate, response

    Beyond GPT architecture: Why Google’s Diffusion approach could reshape LLM deployment

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025

      AMD CEO Lisa Su calls China a ‘large opportunity’ and warns against strict U.S. chip controls

      May 8, 2025
    • Business

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025
    • Crypto

      Another LastPass User Loses $200,000 in Crypto to Hackers

      June 13, 2025

      Stellar (XLM) Price Hits Monthly Low – What’s Next?

      June 13, 2025

      Crypto Founder Sentenced to 8 Months in Prison on Wash Trading Charges

      June 13, 2025

      3 Altcoins That Are Thriving Despite Today’s Brief Market Crash

      June 13, 2025

      Top Altcoins Trending in Nigeria as Traders Shift Beyond Bitcoin, Ethereum

      June 13, 2025
    • Technology

      Just add humans: Oxford medical study underscores the missing link in chatbot testing

      June 14, 2025

      Do reasoning models really “think” or not? Apple research sparks lively debate, response

      June 14, 2025

      Beyond GPT architecture: Why Google’s Diffusion approach could reshape LLM deployment

      June 14, 2025

      The case for embedding audit trails in AI systems before scaling

      June 14, 2025

      Wizards of the Coast and Giant Skull: ‘Gamers are telling us what they have always told us’ | The DeanBeat

      June 14, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»Hacker arrested for breaching 5,000 hosting accounts to mine crypto
    Technology

    Hacker arrested for breaching 5,000 hosting accounts to mine crypto

    TechAiVerseBy TechAiVerseJune 5, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hacker arrested for breaching 5,000 hosting accounts to mine crypto
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Hacker arrested for breaching 5,000 hosting accounts to mine crypto

    The Ukrainian police arrested a 35-year-old hacker who breached 5,000 accounts at an international hosting company and used them to mine cryptocurrency, resulting in $4.5 million in damages.

    “The suspect illegally gained access to over 5,000 accounts belonging to clients of an international hosting company that provides server rental services for the operation of various websites and online platforms,” reads the police’s announcement.

    “After gaining access to these accounts, the perpetrator began unauthorized deployment of virtual machines (software that emulates a computer’s operation) using the company’s server resources.”

    As the threat actor utilized the accounts to mine cryptocurrency on the hosting provider’s servers, the resulting damages were estimated to be $4,500,000.

    The police’s investigation established that the hacker had been active since 2018, using open-source intelligence to find and breach vulnerable infrastructure of international organizations.

    He periodically changed locations to avoid being tracked down, so he lived in the regions of Poltava, Odesa, Zaporizhzhia, and Dnipropetrovsk during the past years.

    During the police raid at his residence, computer equipment, mobile phones, bank cards, and other forms of physical evidence were seized.

    A preliminary examination of the seized materials validated that the hacker maintained multiple accounts on hacker forums.

    The hacker’s seized computer
    Source: Ukraine cyberpolice

    The seized evidence links the hacker to stolen email credentials, cryptocurrency wallets that held the illegally mined coins, software scripts used for launching and managing the mining activity, and tools for conducting data theft and remote access.

    The hacker now faces charges under Part 5 of Article 361 of the Criminal Code of Ukraine, which could bring a maximum penalty of 15 years of imprisonment plus three years of prohibitions to engage in certain activities deemed risky.

    The police noted that the investigation is still underway, and new evidence may add more charges.

    It is unclear if the clients of the hosting firm that had their accounts hacked will be required to pay the bills inflated from the unauthorized mining activity.

    To prevent this from happening to you, always use strong, unique passwords and multi-factor authentication to protect accounts with access to cloud resources.

    Also, regularly check account activity to identify any early compromises and revoke access from unknown devices or applications immediately.

    Why IT teams are ditching manual patch management

    Manual patching is outdated. It’s slow, error-prone, and tough to scale.

    Join Kandji + Tines on June 4 to see why old methods fall short. See real-world examples of how modern teams use automation to patch faster, cut risk, stay compliant, and skip the complex scripts.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleCisco warns of ISE and CCP flaws with public exploit code
    Next Article FBI: Play ransomware breached 900 victims, including critical orgs
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Just add humans: Oxford medical study underscores the missing link in chatbot testing

    June 14, 2025

    Do reasoning models really “think” or not? Apple research sparks lively debate, response

    June 14, 2025

    Beyond GPT architecture: Why Google’s Diffusion approach could reshape LLM deployment

    June 14, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202523 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202518 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202514 Views

    Arizona moves to ban AI use in reviewing medical claims

    March 12, 202511 Views
    Don't Miss
    Technology June 14, 2025

    Just add humans: Oxford medical study underscores the missing link in chatbot testing

    Just add humans: Oxford medical study underscores the missing link in chatbot testing June 13,…

    Do reasoning models really “think” or not? Apple research sparks lively debate, response

    Beyond GPT architecture: Why Google’s Diffusion approach could reshape LLM deployment

    The case for embedding audit trails in AI systems before scaling

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Just add humans: Oxford medical study underscores the missing link in chatbot testing

    June 14, 20250 Views

    Do reasoning models really “think” or not? Apple research sparks lively debate, response

    June 14, 20250 Views

    Beyond GPT architecture: Why Google’s Diffusion approach could reshape LLM deployment

    June 14, 20250 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.