Gov’t Servers in South Korean City ‘Infected with Crypto Mining Malware’

Cybersecurity South Korea
Last updated:
Author
Tim Alper
Author Categories
About Author

Tim Alper is a British journalist and features writer who has worked at Cryptonews.com since 2018. He has written for media outlets such as the BBC, the Guardian, and Chosun Ilbo. He has also worked...

Last updated:
Why Trust Cryptonews
Cryptonews has covered the cryptocurrency industry topics since 2017, aiming to provide informative insights to our readers. Our journalists and analysts have extensive experience in market analysis and blockchain technologies. We strive to maintain high editorial standards, focusing on factual accuracy and balanced reporting across all areas - from cryptocurrencies and blockchain projects to industry events, products, and technological developments. Our ongoing presence in the industry reflects our commitment to delivering relevant information in the evolving world of digital assets. Read more about Cryptonews
The Daejeon Expo Bridge in Daejeon, South Korea.
Source: iuliia_n/Adobe

Crypto mining malware has been found on two government servers in the South Korean city of Daejeon, an audit has found.

Per MBN, the nation’s Ministry of Public Administration and Security commissioned biannual audits of the city government’s servers.

During the most recent audit, in June last year, auditors found that Daejeon City’s “information system was infected with malicious code.”

The code, they said was “used for purposes such as virtual currency mining.”

The city of Daejeon marked on a map of South Korea.
Map adapted from work by TUBS. (CC BY-SA 3.0)

The auditors said they had found “a series of cyber breaches” on two of the city’s servers.

They said that one of the compromised servers was “infected with” mining malware that made use of “exposed” administrator account passwords.

Another server, they said, had been used “as a hacking transit point.” The point allowed attackers to “further infect” the network with crypto mining malware.

The city’s cyber response team said they had detected “abnormal” activities “within eight days.”

The team then quarantined the network and discovered the malicious code. It then reported details to the National Intelligence Service (NIS).

The NIS is South Korea’s top intelligence agency, and deals with breaches of public data.

The auditors, however, stated that a lack of “additional security measures” had allowed hackers to strike with impunity.

Security ‘Oversights’ Let Crypto Miners Hack South Korean Servers?

The audit team noted that the city had failed to use “secure” administrator account password protection.

And the team said that 98 of the city’s 467 information system server devices had “not undergone necessary annual diagnostic checks.”

The ministry ordered the Daejeon Mayoral Office to “thoroughly carry out related work” to “prevent the recurrence of similar cases in the future.”

In 2021, citizens in Seoul were shocked by the news that a government employee had been using city-provided energy to mine Ethereum (ETH) underneath the country’s most prestigious opera house.

Inspectors found the two ETH mining rigs with sophisticated graphics cards. The devices were connected to power outlets in a basement under the opera house’s Calligraphic Art Museum.

More Articles

Altcoin News
Goldman Sachs Ramps Up Ether ETF Holdings by 2,000% as Bitcoin ETF Stash Surpasses $1.5B in Q4 2024
Ruholamin Haqshanas
Ruholamin Haqshanas
2025-02-12 07:27:13
Altcoin News
IRS Urges Appeals Court to Dismiss Crypto Founder’s Challenge to Tax Summonses
Ruholamin Haqshanas
Ruholamin Haqshanas
2025-02-12 06:02:14
Crypto News in numbers
editors
Authors List + 66 More
2M+
Active Monthly Users Around the World
250+
Guides and Reviews Articles
8
Years on the Market
70
International Team Authors