@110110101, Thank you for your reply.
1) Isn't what you say against the principle of anonymity that is surrounded with crypto currencies?
fwiw, it is `Monero` I think that was mined.
Anyway, even if the currency was exchanged somewhere for bitcoins or even real money from bitcoins, how does it help to know?
I'm just trying to trace the flow of information here.
One can't tell the real identity of a person behind a wallet address. So as long as money is being transferred around in the form of crypto currencies, it doesn't really help in knowing the real identity of the person.
Only when the person exchanges the crypto currency with real money will his actual identity be revealed. Am I right here?
I'm not really bent on getting the guy who did this. I might just warn and let him off if I find him. I'm more curious about how all this works
2) I've never really stressed on security. (Good blokes used to use my computers.
)
- They don't use the admin account, but a less privileged one. All this mining happened in the less privileged one itself.
- I think the exe was brought in a device or something and run with no extra privileges. It would be too much of a restriction if executing binaries was restricted right?
- My Microsoft Security Essentials didn't say a thing about the exe.
- About the logs, what exactly did you mean by logs? There was no installation or registry entry made. The exes *
were copied and pasted and run* IMO. I doubt if there were fetched via the network. Since the machines aren't turned off, the miners kept running. :/
Hey Newtocrypto,
I was referring to the fact the most cryptocurrencies used to be pseudo-anonymous, BTC included. One cannot link an address to an individual directly, but the Blockchain makes it possible to follow transactions as the coins are moving around. Maybe a long shot, but if you can trace a payment to an exchange, authorities could ask for server logs, check where the accessing IP came from and make the paperwork done for getting an address connected to the IP.
The attacker could spend the coins at an online store where he/she gives their name and address for shipping. Basically many of the older cryptos could possibly be traced back to an individual, sometimes it's feasible, other times not.
The new generation cryptocurrencies are attempting to be anonymous, so the arguments above become irrelevant in this case.
For logs and auditing, if the attacker had hacked an external service running, you would have probably found access logs, error logs and the like showing who accessed and what they were doing. Now I get the picture that some guy put in a usb thumb stick and started his miner. Apparently MSE doesn't block these programs, I believe ZoneAlarm does. Same for Comodo Internet Security. I don't run Norton, McAffe etc so I can't speak about them.
I understand that you are running a Windows computer hall. Maybe look at sandboxing your systems and having a scheduled reboot at night? That way if an attacker puts in a miner, the system is rolled back to a clean state and the attacker may only make use of the resources for less than 24h. This would limit the damage and still leave the boxes OK for all other everyday users doing their work. Perhaps a better way than trying to catch this fellow, is to decrease the incentive for setting up mining software on the boxes.