Cryptocurrency Mining at Work

Cryptocurrency mining often requires a lot of computation power. Therefore people who want to try their hand at mining must purchase specialized equipment. Not everyone can afford to buy expensive hardware. It usually takes a big mining farm consisting of numerous video cards to get the bang for one’s buck. The electricity bills tend to be discouraging, too. Some individuals, though, have found a way to circumvent these obstacles by parasitizing in their work environment. These people’s foul play is all about the exploitation of enterprise networks to mine digital funds beyond employers’ awareness. Here’s a lowdown on the most defiant incidents of that kind reported to date.

Crafty Miners’ Fiasco in the Crimea

Two employees of the Crimean Council of Ministers reportedly harnessed the processing power of the government agency’s computer network to mine bitcoin. These activities remained below the radar of local authorities for five months on end – from September 2016 to January 2017. The ne’er-do-wells were able to earn 15,000 rubles ($260) worth of Bitcoin this way. Meanwhile, the cost of electric energy that was consumed along the way amounted to 57,000 rubles, the equivalent of $1,000. When the violation was uncovered, the two friends had to pay a fine of 30,000 rubles ($525) each. This undertaking, obviously, didn’t end well for the resourceful entrepreneurs.

Australian Government Agency’s IT Resources Abused

Another story of surreptitious mining at work took place in Australia in February 2018. Two IT staffers of the Bureau of Meteorology, the country’s official weather reporting agency, leveraged the internal computer network to their advantage. Neither the government agency nor law enforcement officials have gotten into detail about the incident. The only reported fact is that the police interrogated the unscrupulous employees. It remains unclear how big the damage is and what the legal action the two are going to face. Interestingly, this weather agency had gained some notoriety a few weeks earlier due to scam ads about a fake cryptocurrency startup by Elon Musk.

Russian Nuclear Facility Employees Breaking Bad

In yet another case that hit the headlines in February 2018, Russian police apprehended several scientists working at a nuclear research center. The top-secret facility is located in Sarov area, western Russia, and specializes in nuclear warhead development for the government.

The adventurous individuals had allegedly used the organization’s supercomputer for unauthorized cryptocurrency mining. The exploited machine has an immense processing power of 1 trillion calculations per second. It is supposed to operate exclusively within the research environment and never go online. However, the mining process per se implies a connection to the Internet, and that was a dead giveaway.

It didn’t take the facility’s internal security department long to identify the misdemeanor. The culprits were handed over to the FSB (Russia’s Federal Security Service) for further investigation. Given the vast capacity of the supercomputer mentioned above, the amount of bitcoin that the employees were able to mine using it must have been sizeable.

Scandalous Exposure in Florida’s Citrus Agency

One more story has to do with an inside job of an IT manager working at Florida’s Department of Citrus. The ill-minded staffer named Matthew McDermott ventured into using the agency’s computers to mine bitcoin, litecoin and other cryptocurrencies over a time span of October 2017 – January 2018. He covertly tethered various machines within the organization to a mining pool.

According to the findings of the Florida Department of Law Enforcement, the unsanctioned mining at the workplace wasn’t the only misconduct that McDermott perpetrated. He reportedly also used the credit card of the government entity to purchase 24 graphics cards for $22,000 and thus give some extra momentum to his questionable business. Although that’s, obviously, pretty poor OPSEC, the threat actor’s activity lasted for months undetected.

One of the things that raised a red flag was a substantial increase in the agency’s electric bills. The numbers grew by 41 percent during the crook’s furtive mining campaign and made Citrus officials delve into the cause. The evidence led to McDermott who got arrested and is being charged with grand theft.

An Intricate Plot in Louisiana Attorney General’s Office?

It turns out that the employees of the Louisiana Department of Justice might not be the most law-abiding citizens, to put it mildly. The state’s Attorney General Jeff Landry started a criminal investigation regarding a purported case of abusing government computers for sneaky cryptocurrency mining. The story most likely began last September when Landry’s office fired several information technology section staffers, although there were no official statements on the reasons back then. It’s not until late February 2018 that the authorities acknowledged an ongoing investigation.

Most details remain a mystery at the time of this writing. The only public allegation boils down to the discovery of some suspicious equipment and malicious code that the staffers, including the former director of the IT division, might have used. The fired employees deny the charges, though. They claim they couldn’t have harnessed agency workstations for mining because they are simply not powerful enough, and the spike in electricity consumption would have attracted too much attention.

Conclusion

Cryptocurrencies might appear to be low-hanging fruit when an employee has access to the enterprise computer network. It is indeed tempting to go ahead and create a crypto mining farm without having to pay the utility bills and spend a fortune on CPUs or GPUs. However, as the incidents above demonstrate, such shenanigans usually leave plenty of breadcrumbs that lead to the culprit at the end of the day.