fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.6K
active users

#cryptomining

5 posts5 participants0 posts today

Sunny Mining launches a mobile cloud mining service that lets you mine BTC, DOGE, and LTC with just one click no hardware or skills required.
Enjoy automatic daily settlements, flexible contracts, and real-time tracking for a transparent and hassle-free experience.
Turn your idle crypto into stable passive income anytime, anywhere.

#SunnyMining #CloudMining #Bitcoin #PassiveIncome #CryptoMining #BTC #DOGE #LTC #TECHi

Read Full Article Here :- techi.com/sunny-mining-mobile-

New Multi Stage CryptoMining Attack Spreads via USB Devices

Pulse ID: 68a5c3e1426904eae8847c65
Pulse Link: otx.alienvault.com/pulse/68a5c
Pulse Author: cryptocti
Created: 2025-08-20 12:47:29

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open

A routine monitoring by researchers uncovered an exploitation attempt on a honeypot server running TeamCity, a CI/CD tool. The attack exploited an exposed Java Debug Wire Protocol (JDWP) interface, leading to remote code execution, deployment of cryptomining payload, and establishment of multiple persistence mechanisms. The attack was notable for its rapid exploitation, use of a customized XMRig payload, and stealthy crypto-mining techniques. JDWP, designed for debugging Java applications, becomes a high-risk entry point when exposed to the Internet without proper authentication. The attackers used a structured sequence to achieve remote code execution, likely using a variant of jdwp-shellifier. They deployed a dropper script that installed an XMRig miner and set up various persistence mechanisms including boot scripts, systemd services, cron jobs, and shell configuration files.

Pulse ID: 68962f0f91f8829022afff4a
Pulse Link: otx.alienvault.com/pulse/68962
Pulse Author: AlienVault
Created: 2025-08-08 17:08:31

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

> “Simply put, almost all of #Bitcoin's actual users have gone away. At all-time price highs, too, We're facing a major crisis. Either the Bitcoin network goes bankrupt, undergoes major changes, or the asset becomes a completely custodial asset run by governments and institutions.”

I've been saying; ETFs are bad for BTC! They are effectively an L2 siphoning off transactions that should be paying for #cryptomining.

thedefiant.io/news/blockchains

The Defiant · Bitcoin Mempool Emptiness Sparks Network Security ConcernsBy Denis Omelchenko