Welcome Guest.
Not a member yet? Why not sign up today and start posting on our forums.
Hackers Fake Computational Power to Steal Cryptocurrencies From Mining Pools

A new attack targeted equihash mining pools that use vulnerable equihashverifier to verify the miner’s shares. The logic vulnerability in the verifier allows an attacker to fake the mining shares without using so much computing power.

The vulnerability may have a huge impact as the verifier equihashverify was previously used by zcash and other new cryptocurrencies.

[Read more...]