Close Menu
    What's Hot

    Solana Price Prediction: Key Levels to Watch as SOL Fights to Reclaim Momentum

    Crypto Miner TeraWulf to Raise $3B in Google-Backed Debt Deal to Expand Data Centers

    I hope these suggestions are helpful! Good luck!

    Facebook X (Twitter) Instagram
    Saturday, September 27
    • About us
    • Contact us
    • Privacy Policy
    • Contact
    Facebook X (Twitter) Instagram
    kryptodaily.com
    • Home
    • Crypto News
      • Altcoin
      • Ethereum
      • NFT
    • Learn Crypto
      • Bitcoin
      • Blockchain
    • Live Chart
    • About Us
    • Contact
    kryptodaily.com
    Home»NFT»Cryptojacking Group Hacks Hundreds Of Devices To Mine Crypto
    NFT

    Cryptojacking Group Hacks Hundreds Of Devices To Mine Crypto

    KryptonewsBy KryptonewsJune 11, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    The Librarian Ghouls hacker group has compromised hundreds of Russian devices and used them to mine crypto in an apparent case of cryptojacking, cybersecurity firm Kaspersky says.

    The hacker group, which is also known as Rare Werewolf, gains access to systems through malware-ridden phishing emails disguised as messages from legitimate organizations that appear to be official documents or payment orders, Kaspersky said in a report on Monday.

    Bad actors can gain access to devices to steal resources such as computing power and mine crypto. Source: Cointelegraph

    Hackers scope out device info before mining

    After a computer is infected with the malware, the hackers establish a remote connection and disable security systems such as Windows Defender.

    The infected device is also programmed to turn on at 1 am and shut down at 5 am, with the hackers using the time frame to further establish unauthorized remote access and steal login credentials.

    “It is our assessment that the attackers use this technique to cover their tracks so that the user remains unaware that their device has been hijacked,” Kaspersky said.

    They then steal login credentials and also collect information about the device’s available RAM, CPU cores and GPUs to optimally configure the crypto miner before deploying it.