HashHive Launches ICO for Cloud Mining in CIS Countries

HashHive uses technologies, which cut cost of hash-power and cooperates with companies for the supply of equipment for immersion and generation of electricity
16 November 2017   1581

During the ICO period the HashHive project plans to attract investments up to 30 million dollars, selling the project token – CELL, is the equivalent of hash-power. Total amount of issued tokens – 2 167 000, from which:

  • 90% Tokens sold during ICO
  • 8% Company Reserve
  • 2% Bounty

Token sale will take place from November 20 to December 19 in 2017. After completion of ICO, HashHive will purchase the site area and equipment to organize the data center. The launch of the Data Center is planned in the second quarter of 2018, and at this time, the first payments to investors will begin according to the marketing plan. According to the ROI of the project from the Whitepaper in the case of receiving planned $30 million within the ICO, HashHive will reach project capacity in 5 months.

The HashHive project is distinguished by the use of innovative technologies of cloud mining. It is planned to use immersion cooling system for mining servers, allowing them to consume less energy. This will be possible due to removal server fans and lower component temperatures.

As a part of the HashHive project, it is planned to install a gas piston engine, which is characterized by high efficiency and fuel flexibility, as a source of primary and backup power. The advantage of this technology in its high efficiency and fuel flexibility.

In future, with funds received from cloud mining, HashHive plans to create a network of data centers located in Russia and CIS countries. These centers will specialize not only in cloud mining, but also on other tasks.

 

Exim Mail Servers to Undergo Massive Attacks

Hackers are using fixed vulnerability, which was found last week, but still more than 3.6M mail servers in the global network remain potentially vulnerable
14 June 2019   306

Cybereason security researchers warned mail server administrators about the discovery of a massive automated attack that exploits a critical vulnerability (CVE-2019-10149) of Exim that was discovered last week. During the attack, hackers seek to execute their code as root and install malware for mining cryptocurrency on the server.

According to the Shodan service, more than 3.6 million mail servers in the global network remain potentially vulnerable, and are not updated to the latest release of Exim 4.92. About 2 million potentially vulnerable servers are located in the USA, 192 thousand in Russia. According to RiskIQ, version 4.92 has already switched 70% of servers to Exim.

Vulnerable Exim Servers
Vulnerable Exim Servers

Administrators are advised to urgently install updates that were prepared last week (Debian, Ubuntu, openSUSE, Arch Linux, Fedora, EPEL for RHEL / CentOS). If there is a defeated version of Exim in the system (from 4.87 to 4.91 inclusive), you need to make sure that the system is no longer compromised by checking the crontab for suspicious calls and to ensure that there are no additional keys in the /root/.ssh directory. The attack can also be indicated by the presence in the log of the firewall of activity from the hosts an7kmd2wp4xo7hpr.tor2web.su, an7kmd2wp4xo7hpr.tor2web.io and an7kmd2wp4xo7hpr.onion.sh, which are used for during the malware download process.

The first attacks on Exim servers were recorded on June 9th. By June 13, the attack became widespread. After exploiting the vulnerabilities through the tor2web gateways, the Tor hidden service (an7kmd2wp4xo7hpr) downloads a script that checks for OpenSSH (if not installed), changes its settings (allows root login and key authentication) and sets the root user for the root user access to the system via SSH.

After setting up the backdoor, a port scanner is installed in the system to identify other vulnerable servers. It also searches the system for existing mining systems that are deleted if detected. At the last stage, the own miner is loaded and registered in the crontab. The miner is loaded under the guise of an ico-file (in fact, is a zip-archive with the password "no-password"), in which the executable file in ELF format for Linux with Glibc 2.7+ is packed.