We saw that load spiked on one of Ubuntu servers yesterday and found this on the proc list using all our cores:
statd 7680 690 0.0 743976 58492 ? Sl Nov26 20914:53 ./yam -c 1 -M stratum+tcp://binyu.crypto%40gmail.com:x@xmr.pool.minergate.com:45660/xmr
This was running under the statd user.
What do we do? We checked firewall, SSH, all seem OK. How do we go about investigating this breach?
Do help!
I'm not very familiar with the tech behind BTC mining so there may be some obvious reason that isn't feasible. I was always surprised some evil company like EA hasn't added it to wait screens when matchmaking for various games. They could install whatever they want, target machines likely have solid GPUs, and they are sitting around waiting.
I also wonder about the legal aspects of this. Would someone need to opt in this? Is the energy cost of something like this legally distinguishable from sites that say... load a bazillion tracking tags and eat up your data cap?