Hackers made $110,000 in cryptocurrency on hijacked HP servers


By MYBRANDBOOK


Hackers made $110,000 in cryptocurrency on hijacked HP servers

The hackers breached a data center's cybersecurity and reprogrammed its HP servers to help them mine Raptoreum cryptocurrency. In total, the hackers made off with approximately US$110,000 worth of the currency.

 

The sudden disappearance of the HP server group indicated that the servers had been patched, revealing to be used non-consensually. During the period in which the HP servers were mining, the address accumulated about 30% of the total block reward or 3.4 million RTM.

 

Raptoreum’s base algorithm, GhostRider, is a blend of proof-of-work and proof-of-stake, that’s intentionally resistant to accelerators and other causes of instability. GhostRider is particularly fond of AMD CPUs because of their large L3 cache. Raptoreum is surprisingly profitable on AMD’s costly Epyc server CPUs because of their 256 MB of cache on models with 32 or more cores.

 

This likely prompted the hackers to target the HP servers, which were found in an informal investigation conducted by Raptoreum’s developers to be 9000-series and using Epyc processors. All of this information is viewable through the Raptoreum blockchain. Its developers are bringing attention to it to dismiss the rumor that Raptoreum is unstable.

 E-Magazine 
 VIDEOS  Placeholder image
 ITFORUM 2025  

 STARNITE AWARDS 2024  

   



 CMO of the Year   Placeholder image

 WOMEN LEADERSHIP  Placeholder image

 IMAGE GALLERY   Placeholder image

 TRENDS IN TECHNOLOGY  Placeholder image

MORE VIDEOS  Placeholder image
 ADVERTISEMENTS  Placeholder image
Brandbook Brandbook

 TECHNOLOGY DISRUPTION Placeholder image


 UNICORNS REVOLUTIONISING Placeholder image




Copyright www.mybrandbook.co.in @1999-2025 - All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.
Other Initiatives : www.varindia.com | www.spoindia.org
of images belongs to the respective copyright holders