Luxor Forums - White Hat & Community Forums
Hackers Fake Computational Power to Steal Cryptocurrencies From Mining Pools
A new attack targeted equihash mining pools that use vulnerable equihashverifier to verify the miner’s shares. The logic vulnerability in the verifier allows an attacker to fake the mining shares without using so much computing power.

The vulnerability may have a huge impact as the verifier equihashverify was previously used by zcash and other new cryptocurrencies.

[Read more...]
Possibly Related Threads...
Last Post
Replies: 0
Views: 169
12-16-2017, 08:21 PM
Last Post0xB9
Replies: 3
Views: 207
11-22-2017, 06:40 PM
Last PostSerpius
Replies: 1
Views: 260
10-28-2017, 05:23 AM
Last PostSerpius