{"id":36832,"date":"2020-12-11T12:01:15","date_gmt":"2020-12-11T12:01:15","guid":{"rendered":"https:\/\/www.vmengine.net\/2020\/12\/11\/lamezia-airport-scrounging-cryptocurrencies-heres-why-this-isnt-possible-with-aws\/"},"modified":"2025-05-23T17:24:39","modified_gmt":"2025-05-23T17:24:39","slug":"lamezia-airport-scrounging-cryptocurrencies-heres-why-this-isnt-possible-with-aws","status":"publish","type":"post","link":"http:\/\/temp_new.vmenginelab.com\/en\/2020\/12\/11\/lamezia-airport-scrounging-cryptocurrencies-heres-why-this-isnt-possible-with-aws\/","title":{"rendered":"Lamezia Airport &#8220;Scrounging&#8221; Cryptocurrencies: Here&#8217;s Why This Isn&#8217;t Possible with AWS"},"content":{"rendered":"<div class=\"et_pb_section et_pb_section_207 et_section_regular\" >\n<div class=\"et_pb_row et_pb_row_297\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_296  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_581  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<h5><em><span style=\"font-weight: 400;\">He was an anonymous employee of Lamezia<\/span> <span style=\"font-weight: 400;\">Terme airport but was able to jeopardize the airport&#8217;s cybersecurity by using the computing power of the local server to mine cryptocurrencies.<\/span><span style=\"font-weight: 400;\"><\/span><\/em><\/h5>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_582  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><span style=\"font-weight: 400;\">Suffice it to say that the Sacal technician, as the company that manages the IT services of Calabrian airports is called, was identified by the postal police and investigated by the Public Prosecutor&#8217;s Office of Catanzaro and Reggio Calabria for having carried out what in the world of cryptocurrencies is called <\/span><span style=\"font-weight: 400;\">&#8220;<\/span><span style=\"font-weight: 400;\">mining&#8221; or extracting, and with this expression he<\/span><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It identifies the resolution of complex calculations by a machine to produce a cryptocurrency.<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the reconstruction made by the postal police, <\/span><b>the technician would have managed to install malware in<\/b> <span style=\"font-weight: 400;\">the<\/span> <b>IT infrastructure of the Calabrian airport, thus exploiting the computing power generated by computers to extract, then produce, the Ethereum cryptocurrency<\/b><span style=\"font-weight: 400;\">. <\/span> <\/p>\n<p><span style=\"font-weight: 400;\">In essence, the technician-hacker had created inside<\/span><span style=\"font-weight: 400;\"> <span style=\"font-weight: 400;\">two rooms of the<\/span><span style=\"font-weight: 400;\"><\/span><\/span><span style=\"font-weight: 400;\">A &#8220;mining farm&#8221; at the airport. The abusive network consisted of five powerful computers capable of performing the complex calculations needed to mine the cryptocurrency.  <\/span><\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_583  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><span style=\"font-weight: 400;\">With this system <\/span><b>, the astute technician was able to produce Ethereum without spending on the electricity consumed by the machines, exploiting the internet connection of Sacal&#8217;s plants <\/b><span style=\"font-weight: 400;\">and, according to investigators, compromising airport IT security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For him, most likely, it will be pains. But how is it possible that such complex systems can be hacked and exploited in this way?  <\/span><span style=\"font-weight: 400;\">Certainly, the young technician&#8217;s in-depth knowledge of the systems could allow him to circumvent or disable the controls that should have been implemented to prevent the resources of a computing system from being used in cryptocurrency mining processes.<\/span><\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_241 et_animated et-waypoint\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img fetchpriority=\"high\" decoding=\"async\" width=\"960\" height=\"506\" src=\"https:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2020\/12\/servers-min.jpg\" alt=\"\" title=\"\"  sizes=\"(max-width: 960px) 100vw, 960px\" class=\"wp-image-32373\" srcset=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2020\/12\/servers-min.jpg 960w, http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2020\/12\/servers-min-300x158.jpg 300w, http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2020\/12\/servers-min-768x405.jpg 768w, http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2020\/12\/servers-min-720x380.jpg 720w\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_584  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<h4> <\/h4>\n<h5>But what would have happened if the datacenter systems had been &#8220;leaned&#8221; on a Cloud Provider such as Amazon Web Service?<\/h5>\n<\/p>\n<p><span style=\"font-weight: 400;\">First, AWS performs preliminary environmental and geographic assessments before choosing a location. Availability Zones are built to be independent and physically separate from each other.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And that&#8217;s not all. Physical access points to server rooms are controlled by CCTV cameras, and authorized personnel use multi-factor authentication mechanisms to access data centers. In addition, the entrances to the server rooms are protected by devices that trigger an alarm and incident response in the event that the door remains open or is forced.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The present case, however, is representative of a growing phenomenon. With the advent of virtual currency, attacks by so-called &#8220;cybercriminals&#8221; have multiplied, trying to fraudulently withdraw energy or exploit the computing power of the computer systems of large industries, power plants or, as in this case, airports, for the operation of computers intended to extract cryptocurrency, through actions that seriously endanger the security and the very functioning of the affected industrial complexes.  <\/span><\/p>\n<p><span style=\"font-weight: 400;\">There is a big &#8220;but&#8221; in this story because, as we have seen previously, if Sacal&#8217;s datacenters had been designed and managed by AWS, the Calabrian hacker could have &#8220;scrounged&#8221; at most the coffee at the bar from his colleagues.<\/span><\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_97 et_animated et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark\">\n<div class=\"et_pb_promo_description\">\n<h2 class=\"et_pb_module_header\">How much does your data center security cost?  <\/h2>\n<div>\n<p style=\"text-align: center;\">The value of the cloud goes beyond<strong> reducing total cost of ownership (TCO),<\/strong> which is often unpredictable and difficult to calculate.<\/p>\n<p style=\"text-align: center;\">AWS customers are also seeing significant improvements in other areas, including staff productivity, business elasticity, and most importantly, the security of enterprise data and workloads.<\/p>\n<\/div>\n<\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/aws.amazon.com\/it\/economics\/\" target=\"_blank\" data-icon=\"&#x54;\">Discover the Cloud Value Framework now<\/a><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>He was an anonymous employee of Lamezia Terme airport but was able to jeopardize the airport&#8217;s cybersecurity by using the computing power of the local server to mine cryptocurrencies. Suffice it to say that the Sacal technician, as the company that manages the IT services of Calabrian airports is called, was identified by the postal [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":32372,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,2297],"tags":[2801,1888,4284,4285,1406,4154,4286],"class_list":["post-36832","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-news-en","tag-amazon-aws-en","tag-cloud-provider-en","tag-cryptocurrencies","tag-cybersecurity-en","tag-datacenter-en","tag-hacker-attack","tag-malware-en"],"aioseo_notices":[],"jetpack_featured_media_url":"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2020\/12\/airport-min-1.jpg","amp_enabled":true,"_links":{"self":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/comments?post=36832"}],"version-history":[{"count":1,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36832\/revisions"}],"predecessor-version":[{"id":41519,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36832\/revisions\/41519"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media\/32372"}],"wp:attachment":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media?parent=36832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/categories?post=36832"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/tags?post=36832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}