Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm genuinely curious. What type of fraud or abuse are you trying to prevent? Maybe cover that in the postmortem.


If your DO (or other cloud provider) credentials are compromised, it's usually a matter of seconds before someone fires up the largest possible number of instances to start crypto mining.


Yup. LeonM, you are correct. In this case that was the cryptocurrency mining detector that was triggered. More details in the postmortem.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: