Skip to main content

Bitcoin Heist: 600 Powerful Computers Stolen in Iceland The computers, which have not yet been found, are worth almost $2 million.


Some 600 computers used to "mine" bitcoin and other virtual currencies have been stolen from data centers in Iceland in what police say is the biggest series of thefts ever in the North Atlantic island nation.
Some 11 people were arrested, including a security guard, in what Icelandic media have dubbed the "Big Bitcoin Heist." A judge at the Reykjanes District Court on Friday ordered two people to remain in custody.
Advertisement - Continue Reading Below
The powerful computers, which have not yet been found, are worth almost $2 million. But if the stolen equipment is used for its original purpose — to create new bitcoins — the thieves could turn a massive profit in an untraceable currency without ever selling the items.
"This is a grand theft on a scale unseen before," said Olafur Helgi Kjartansson, the police commissioner on the southwestern Reykjanes peninsula, where two of the burglaries took place. "Everything points to this being a highly organized crime."
Three of four burglaries took place in December and a fourth took place in January, but authorities did not make the news public earlier in hopes of tracking down the thieves.
Bitcoin is a kind of digital money that isn't tied to a bank or a government. It has been hugely volatile, posting some dizzying intra-day rises and falls over the past year or so. The price of a single bitcoin rocketed to nearly $20,000 late last year and then plunged early this year. On Friday, it was trading just below the $11,000 mark.
Bitcoin and other cryptocurrencies rely on the blockchain, the name given to the public, distributed ledgers which track the coins' ownership. The Bitcoin ledger is powered by "miners," so-called because they throw computational power into the system, occasionally receiving — or "mining" — new bitcoins in return. Drumming up that computational power usually means lots of computers — and thus lots of electricity.
That desire for energy has created a gold rush for bitcoin in Iceland. Traders searching for cheap, renewable energy have been flooding into the island in recent months to take advantage of its geothermal and hydroelectric power plants.
Advertisement - Continue Reading Below
Police tracking the stolen computers are monitoring electric consumption across the country in hopes the thieves will show their hand, according to an industry source who spoke on condition of anonymity because he is not allowed to speak to the media.
Unusually high energy usage might reveal the whereabouts of the illegal bitcoin mine.
Authorities this week called on local internet providers, electricians and storage space units to report any unusual requests for power.
In Edinburgh on Friday, Bank of England Governor Mark Carney launched a withering attack on cryptocurrencies such as bitcoin and urged regulators around the world to monitor them in the same way as other financial assets.
In a speech to the Scottish Economics conference, Carney said a "global speculative mania" has "encouraged a proliferation of new cryptocurrencies" and said they should be held to the "same standards" as the rest of the financial system.
"Being part of the financial system brings enormous privileges, but with them great responsibilities," Carney said.

Comments

Popular posts from this blog

IMPORTANCE AND ADVANTAGES OF SIWES

STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) The Industrial Training/Students Industrial Work Experience Scheme, IT/SIWES is a new Directorate under the Vice-Chancellor’s Office.  It was established on 20th April, 2012 The Students Industrial Work Experience Scheme (SIWES) is a skills training programme designed to expose and prepare students of universities and other tertiary institutions for the Industrial Work situation they are likely to meet after graduation.  It is also a planned and structured programme based on stated and specific career objectives which are geared towards developing the occupational competencies of participants (Mafe, 2009).  Consequently, the SIWES programme is a compulsory graduation requirement for all Nigerian university students offering certain courses. The Students Industrial Work Experience Scheme (SIWES), is the accepted training programme, which

How to Reset HP Elitebook 8460p BIOS/Administrator Password

Have you  forgotten HP Elitebook 8460p password , bios or administrator account password? How to do if both of them lost? It seems hard though there may be lots of ways that can solve it. But if we talk about it separately, such as in two parts,  HP elitebook password reset  would be not so difficult. Part 1: Reset HP Elitebook 8460p BIOS password Part 2: HP Elitebook 8460p Administrator password recovery Part 1: How to Reset Forgotten HP Elitebook BIOS Password? Generally, there are two ways to  reset forgotten BIOS password .  One  is forcing BIOS/CMOS to reset itself to its stored defaults by removing all power from it.  The other  is to use a program to either locate or identify the password, and reveal it to you or erasing the password clearly. And the most easiest and convenient method for erasing dynamic BIOS/CMOS settings is to remove battery directly from the motherboard. However, it applies to most motherboards besides HP Elitebook BIOS. Fortunately, HP Eliteb

Ethical Hacking - TCP/IP Hijacking

TCP/IP Hijacking is when an authorized user gains access to a genuine network connection of another user. It is done in order to bypass the password authentication which is normally the start of a session. In theory, a TCP/IP connection is established as shown below − To hijack this connection, there are two possibilities − Find the seq which is a number that increases by 1, but there is no chance to predict it. The second possibility is to use the Man-in-the-Middle attack which, in simple words, is a type of network sniffing . For sniffing, we use tools like Wireshark or Ethercap . Example An attacker monitors the data transmission over a network and discovers the IP’s of two devices that participate in a connection. When the hacker discovers the IP of one of the users, he can put down the connection of the other user by DoS attack and then resume communication by spoofing the IP of the disconnected user. Shijack In practice, one of the best TCP/IP hijack too