У нас вы можете посмотреть бесплатно IT News: Hacker Breaches Accounts Mines Crypto или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
A 35-year-old hacker in Ukraine has been arrested for breaching 5,000 accounts at an international hosting company. This breach was used to mine cryptocurrency, causing significant financial damage. The hacker illegally accessed accounts belonging to clients of a hosting company that provides server rental services. By deploying virtual machines on these accounts, he mined cryptocurrency, resulting in damages estimated at $4.5 million. The hacker exploited vulnerabilities in the infrastructure of international organizations, using open-source intelligence to identify weak points. The police investigation revealed that the hacker had been active since 2018. He frequently changed locations, living in Poltava, Odesa, Zaporizhzhia, and Dnipropetrovsk to avoid detection. During a raid, authorities seized computer equipment, mobile phones, and bank cards. Evidence linked him to stolen email credentials, cryptocurrency wallets, and software scripts used for mining activities. The hacker maintained multiple accounts on hacker forums, which were discovered during the investigation. The seized evidence confirmed his involvement in data theft and unauthorized remote access. He now faces charges under Part 5 of Article 361 of the Criminal Code of Ukraine, which could lead to a maximum penalty of 15 years in prison. The investigation is ongoing, and new evidence may lead to additional charges. It remains unclear if the hosting firm's clients will be responsible for the inflated bills resulting from the unauthorized mining activity. The case highlights the importance of cybersecurity and the potential consequences of neglecting it. To protect yourself, use strong, unique passwords and enable multi-factor authentication. Regularly check account activity to spot early compromises and revoke access from unknown devices or applications immediately. These steps can help safeguard your accounts from similar breaches.