Cryptomining arrest only the start of problems for these nuke plant workers

With the popularity of cryptocurrency mining, everyone is trying to get in on the action. This naturally leads to numerous illegal actions on the part of cybercriminals who attempt to get every advantage in getting a payday. In an extreme act of foolishness, this fact can now be applied to a set of (soon to be unemployed) workers of a nuclear power plant.

According to local media in Ukraine, workers at a nuclear power plant in the Nikolaev region were arrested by SBU (Ukrainian secret service) for using a plant supercomputer in their cryptomining scheme. According to what investigators have told the Ukrainian media publication InternetUA, the charges are incredibly severe as “information about the physical protection of a nuclear power plant was disclosed, which is a state secret.” The problems for the arrested are compounded when you also add the fact that members of the National Guard of Ukraine guarding the plant were apparently in on the scheme.

The search conducted by investigators into the cryptomining uncovered unauthorized computer components being used in an office in the administrative building. As reported by media, the items seized by the SBU were “six Radeon RX 470 video cards, two risers [extension cords that are used to connect additional video cards to the motherboard], four power supplies, three system units (one of them is homemade), a switch with a block power supply, a switch without a power supply, a metal bracket with three video cards, seven raisers and five cables to the raisers, a motherboard, a USB flash drive, and a hard drive.”

The irony in all of this is that the initial crime of illegally utilizing the plant’s supercomputer for cryptocurrency mining is the least of the defendants’ worries. By exposing classified data, there is no telling just how severely the Ukrainian government will punish them. Add to the fact that some of the culprits were in the military, and the consequences are guaranteed to be severe.

Featured image: Flickr / Tennessee Valley Authority

Derek Kortepeter

Derek Kortepeter is a graduate of UCLA and tech journalist that is committed to creating an informed society with regards to Information Security. Kortepeter specializes in areas such as penetration testing, cryptography, cyber warfare, and governmental InfoSec policy.

Published by
Derek Kortepeter

Recent Posts

Safeguarding your digital identities in a hostile world

In today’s online world where everything is tracked and saved, safeguarding digital identities is crucial both for individuals and for…

23 mins ago

Exchange errors: Common problems and commonsense fixes

Exchange errors are the curse of every IT admin’s job. Here are some common issues you may face — and…

3 hours ago

Losing your edge? 7 free tools to keep you focused at work

Staying focused at work in an always-connected world is hard! Here’s how to use tech — and some free tools…

20 hours ago

What’s next in the evolution of biometrics and facial recognition technology?

Facial recognition technology has matured to the point of being reliable — for better or for worse. What does the…

1 day ago

Locking down your Exchange server with cipher suites

Cipher suites are a set of algorithms you need to secure your environment, either by using SSL and TLS. Here’s…

1 day ago

AI cyber risks: What to look out for when deploying AI technology

Artificial intelligence has greatly improved modern life. But businesses must recognize that AI cyber risks exist and take appropriate measures.

2 days ago