Close Menu
geekfence.comgeekfence.com
    What's Hot

    From resumes to results: Findem bets on verified hiring with Glider AI 

    March 29, 2026

    Test and measurement gets an AI upgrade

    March 29, 2026

    Do AI Coding Assistants Powered by LLMs Reduce the Need for Programmers?

    March 29, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Wind farm worker sentenced after turning turbines into a secret crypto mine
    Cyber Security

    Wind farm worker sentenced after turning turbines into a secret crypto mine

    AdminBy AdminNovember 20, 2025No Comments2 Mins Read4 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Wind farm worker sentenced after turning turbines into a secret crypto mine
    Share
    Facebook Twitter LinkedIn Pinterest Email


    A technical manager at a Dutch wind farm operator has been sentenced to 120 hours of community service after it was discovered he had secretly installed cryptocurrency mining rigs at two wind farm sites – just as the company was recovering from a ransomware attack.

    Wind farm operator Nordex discovered that its turbines were not only generating green energy, but were also powering a secret cryptocurrency mining operation at two of its sites in Gieterveen and Waardpolder.

    The unnamed rogue employee, who is in his forties, connected three cryptocurrency mining rigs and two Helium network nodes (a device which acts as both a wireless gateway and blockchain node) to his employer’s internal network between August and November 2022.

    The mining rigs were plugged directly into Nordex’s router at a substation in Gieterveen, while the Helium hotspots were installed inside the actual wind turbines at the Waardpolder site.

    A court in Assen heard that Nordex had shortly before it discovered the unauthorised cryptomining equipment been dealing with a ransomware attack orchestrated by the notorious Conti gang.

    The Dutch man is far from alone in attempting to turn company resources into cryptocurrency, as I have reported in the past.

    For instance, in February 2018, several scientists at the Russian Federal Nuclear Center in Sarov – a top-secret nuclear warhead facility – were arrested for attempting to use one of the country’s most powerful supercomputers to mine Bitcoin. One of them, Denis Baykov, was ultimately fined 450,000 rubles after being found guilty.

    In the same year in China, headmaster Lei Hua lost his job after stealing the school’s electricity to power a secret cryptocurrency-mining rig of eight servers that ran day and night mining Ethereum.

    In the wind farm case, the court was told that the employee showed “no concern” about the potential disruption his action could have caused to turbine operations, used to generate power for thousands of homes.

    Ordered to pay €4,155.65 in damages to Nordex, plus the same amount to the state, the man has been sentenced to 120 hours of community service.

    All organisations should remember that insider threats are a significant problem, especially with technical staff having privileged access to systems and data.

    In this instance, the message is clear. Renewable energy may be for the public good, but that does not mean that it is necessarily acceptable for the public to exploit or monetise.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Why Professional Skills Matter in the Age of AI

    March 29, 2026

    Never knock on the door of a nuclear submarine base and ask for a selfie • Graham Cluley

    March 28, 2026

    Implementing Post-Quantum Cryptography in Android

    March 27, 2026

    Coruna iOS exploit framework linked to Triangulation attacks

    March 26, 2026

    The Kill Chain Is Obsolete When Your AI Agent Is the Threat

    March 25, 2026

    ‘CanisterWorm’ Springs Wiper Attack Targeting Iran – Krebs on Security

    March 24, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202527 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202624 Views

    Redefining AI efficiency with extreme compression

    March 25, 202619 Views
    Don't Miss

    From resumes to results: Findem bets on verified hiring with Glider AI 

    March 29, 2026

    Findem’s acquisition of Glider AI signals an inevitable shift in talent acquisition from operational efficiency to outcome-driven hiring. Enterprises are moving beyond speed-based metrics…

    Test and measurement gets an AI upgrade

    March 29, 2026

    Do AI Coding Assistants Powered by LLMs Reduce the Need for Programmers?

    March 29, 2026

    Excel 101: Cell and Column Merge vs Combine

    March 29, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    From resumes to results: Findem bets on verified hiring with Glider AI 

    March 29, 2026

    Test and measurement gets an AI upgrade

    March 29, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.