Close Menu
geekfence.comgeekfence.com
    What's Hot

    HCLTech acquires HPE telco unit

    December 29, 2025

    This tiny chip could change the future of quantum computing

    December 29, 2025

    What’s In a Name? Mainframe GDGs Get the Job Done

    December 29, 2025
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Wind farm worker sentenced after turning turbines into a secret crypto mine
    Cyber Security

    Wind farm worker sentenced after turning turbines into a secret crypto mine

    AdminBy AdminNovember 20, 2025No Comments2 Mins Read2 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Wind farm worker sentenced after turning turbines into a secret crypto mine
    Share
    Facebook Twitter LinkedIn Pinterest Email


    A technical manager at a Dutch wind farm operator has been sentenced to 120 hours of community service after it was discovered he had secretly installed cryptocurrency mining rigs at two wind farm sites – just as the company was recovering from a ransomware attack.

    Wind farm operator Nordex discovered that its turbines were not only generating green energy, but were also powering a secret cryptocurrency mining operation at two of its sites in Gieterveen and Waardpolder.

    The unnamed rogue employee, who is in his forties, connected three cryptocurrency mining rigs and two Helium network nodes (a device which acts as both a wireless gateway and blockchain node) to his employer’s internal network between August and November 2022.

    The mining rigs were plugged directly into Nordex’s router at a substation in Gieterveen, while the Helium hotspots were installed inside the actual wind turbines at the Waardpolder site.

    A court in Assen heard that Nordex had shortly before it discovered the unauthorised cryptomining equipment been dealing with a ransomware attack orchestrated by the notorious Conti gang.

    The Dutch man is far from alone in attempting to turn company resources into cryptocurrency, as I have reported in the past.

    For instance, in February 2018, several scientists at the Russian Federal Nuclear Center in Sarov – a top-secret nuclear warhead facility – were arrested for attempting to use one of the country’s most powerful supercomputers to mine Bitcoin. One of them, Denis Baykov, was ultimately fined 450,000 rubles after being found guilty.

    In the same year in China, headmaster Lei Hua lost his job after stealing the school’s electricity to power a secret cryptocurrency-mining rig of eight servers that ran day and night mining Ethereum.

    In the wind farm case, the court was told that the employee showed “no concern” about the potential disruption his action could have caused to turbine operations, used to generate power for thousands of homes.

    Ordered to pay €4,155.65 in damages to Nordex, plus the same amount to the state, the man has been sentenced to 120 hours of community service.

    All organisations should remember that insider threats are a significant problem, especially with technical staff having privileged access to systems and data.

    In this instance, the message is clear. Renewable energy may be for the public good, but that does not mean that it is necessarily acceptable for the public to exploit or monetise.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

    December 29, 2025

    How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

    December 28, 2025

    What are brushing scams and how do I stay safe?

    December 27, 2025

    Black or Scrambled Phone Screen? Here’s How to Spot a Hacked vs Broken Phone

    December 26, 2025

    Closing the gap: bitsIO wins Splunkie Award for data and AI-powered nonprofit solutions

    December 25, 2025

    Google Online Security Blog: Further Hardening Android GPUs

    December 23, 2025
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 20258 Views

    Microsoft 365 Copilot now enables you to build apps and workflows

    October 29, 20258 Views

    Here’s the latest company planning for gene-edited babies

    November 2, 20257 Views
    Don't Miss

    HCLTech acquires HPE telco unit

    December 29, 2025

    HCLTech moves toward a future of AI-driven growth In sum – what we know: The…

    This tiny chip could change the future of quantum computing

    December 29, 2025

    What’s In a Name? Mainframe GDGs Get the Job Done

    December 29, 2025

    Microsoft named a Leader in Gartner® Magic Quadrant™ for AI Application Development Platforms

    December 29, 2025
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    HCLTech acquires HPE telco unit

    December 29, 2025

    This tiny chip could change the future of quantum computing

    December 29, 2025

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2025 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.