Close Menu
geekfence.comgeekfence.com
    What's Hot

    OpenAI launches GPT-5.2 as it battles Google’s Gemini 3 for AI model supremacy – Computerworld

    December 14, 2025

    The Download: Expanded carrier screening, and how Southeast Asia plans to get to space

    December 14, 2025

    How Bayer transforms Pharma R&D with a cloud-based data science ecosystem using Amazon SageMaker

    December 14, 2025
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Wind farm worker sentenced after turning turbines into a secret crypto mine
    Cyber Security

    Wind farm worker sentenced after turning turbines into a secret crypto mine

    AdminBy AdminNovember 20, 2025No Comments2 Mins Read2 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Wind farm worker sentenced after turning turbines into a secret crypto mine
    Share
    Facebook Twitter LinkedIn Pinterest Email


    A technical manager at a Dutch wind farm operator has been sentenced to 120 hours of community service after it was discovered he had secretly installed cryptocurrency mining rigs at two wind farm sites – just as the company was recovering from a ransomware attack.

    Wind farm operator Nordex discovered that its turbines were not only generating green energy, but were also powering a secret cryptocurrency mining operation at two of its sites in Gieterveen and Waardpolder.

    The unnamed rogue employee, who is in his forties, connected three cryptocurrency mining rigs and two Helium network nodes (a device which acts as both a wireless gateway and blockchain node) to his employer’s internal network between August and November 2022.

    The mining rigs were plugged directly into Nordex’s router at a substation in Gieterveen, while the Helium hotspots were installed inside the actual wind turbines at the Waardpolder site.

    A court in Assen heard that Nordex had shortly before it discovered the unauthorised cryptomining equipment been dealing with a ransomware attack orchestrated by the notorious Conti gang.

    The Dutch man is far from alone in attempting to turn company resources into cryptocurrency, as I have reported in the past.

    For instance, in February 2018, several scientists at the Russian Federal Nuclear Center in Sarov – a top-secret nuclear warhead facility – were arrested for attempting to use one of the country’s most powerful supercomputers to mine Bitcoin. One of them, Denis Baykov, was ultimately fined 450,000 rubles after being found guilty.

    In the same year in China, headmaster Lei Hua lost his job after stealing the school’s electricity to power a secret cryptocurrency-mining rig of eight servers that ran day and night mining Ethereum.

    In the wind farm case, the court was told that the employee showed “no concern” about the potential disruption his action could have caused to turbine operations, used to generate power for thousands of homes.

    Ordered to pay €4,155.65 in damages to Nordex, plus the same amount to the state, the man has been sentenced to 120 hours of community service.

    All organisations should remember that insider threats are a significant problem, especially with technical staff having privileged access to systems and data.

    In this instance, the message is clear. Renewable energy may be for the public good, but that does not mean that it is necessarily acceptable for the public to exploit or monetise.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Apple fixes two zero-day flaws exploited in ‘sophisticated’ attacks

    December 14, 2025

    Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

    December 13, 2025

    Microsoft Patch Tuesday, December 2025 Edition – Krebs on Security

    December 12, 2025

    How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

    December 11, 2025

    Brushing Scams: What They Are and How to Stay Safe From Unsolicited Packages

    December 10, 2025

    The Real Magic of the Season: AI-Powered Workplaces

    December 9, 2025
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 20256 Views

    Microsoft 365 Copilot now enables you to build apps and workflows

    October 29, 20256 Views

    Here’s the latest company planning for gene-edited babies

    November 2, 20255 Views
    Don't Miss

    OpenAI launches GPT-5.2 as it battles Google’s Gemini 3 for AI model supremacy – Computerworld

    December 14, 2025

    Rachid ‘Rush’ Wehbi, CEO of e-commerce platform Sell The Trend, has tested GPT-5.2 under real-world…

    The Download: Expanded carrier screening, and how Southeast Asia plans to get to space

    December 14, 2025

    How Bayer transforms Pharma R&D with a cloud-based data science ecosystem using Amazon SageMaker

    December 14, 2025

    How cloud infrastructure shapes the modern Diablo experience 

    December 14, 2025
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    OpenAI launches GPT-5.2 as it battles Google’s Gemini 3 for AI model supremacy – Computerworld

    December 14, 2025

    The Download: Expanded carrier screening, and how Southeast Asia plans to get to space

    December 14, 2025

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2025 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.