The Russian truck -based encryption mine was seized to steal power in Buryatia
The authorities in the Russian Republic of Boriyatia revealed an illegal mining operation hidden inside the Kamaz truck, which is roaming in the electricity designated for a nearby village.
It was discovered during the examination of the routine power line in the Pribaikalsky area, and the unauthorized setting was directed by the electricity from the 10 kilometer line, which is enough to provide a small village, According to To the state -owned Russian news agency TASS.
Inside the truck, the inspectors found 95 mining platforms and a mobile transformer station. Two people believed to be connected to the operation escaped from the scene in the SUV before the police arrived.
This represents the sixth case of the theft of electricity associated with encryption mining in Pohoria since the beginning of the year, according to the Buryaterergo unit in Russia Siberia. The authorities have warned that illegal ties disrupted local networks, causing voltage drops, excessive loads, and potential power outages.
Related to: “Crypto EXEC has made a” secret pipeline for dirty money, “says Doj.
Russia prohibits encryption mining in some areas
Using across most Buryatia is prohibited from November 15 to March 15 due to regional energy shortage. Outside of that window, only companies registered in custom areas such as severo-baikalsky and Muisky are allowed.
The campaign comes amid broader federal restrictions. In December 2024, Russia announced a ban on mining during the most famous energy in many regions, including Dagestan, Chechnya, and parts of eastern Ukraine currently under Russian control.
A complete ban has already been imposed in the southern Irkutsk region since April.
The major Russian mining companies such as Bitriver depend on cheap electricity in IRKUTSK. According to local sources, IRKUTSK Hosts The first and largest data center by Bitriver, which was launched in 2019 in Bratsk.
Related to: The largest bank in Russia offers bitcoin links
Hacker group targets the Russians to encrypt
Kaspersky tied the Hacker group known as “Ghoul Amin, library” or “rare wolf” with the encryption campaign that was at risk hundreds of Russian devices. The group used emails for pure hunting, which is legitimate documents to spread harmful programs and control unauthorized mining systems.
Once injured, harmful programs disable Defender Windows and scheduling devices at risk to work between 1 am and 5 am, a tactic designed to avoid detection.
During this window, the infiltrators create a distance access, steal the entry login data, and evaluate the system specifications to form miners efficiently.
magazine: China is threatened by the United States Stablecoins, urged Group 7 to treat the Lazaros group: Asia Express