Monero 51% attack disrupted by alleged DDoS attack on Qubic mining pool

The Qubic mining pool, which is attempting a 51% attack on Monero, is allegedly being hit by a distributed denial-of-service attack linked to the Monero community.

The mining pool behind an attempted 51% attack on Monero is reportedly under a distributed denial-of-service (DDoS) attack, disrupting the effectiveness of the takeover attempt.

In a Sunday X post, Sergey Ivancheglo — who claims responsibility for the network attack — said the Qubic mining pool he controls is under a DDoS attack. He added that the attack resulted in the attacking pool’s hashrate falling from 2.6 gigahashes per second down to 0.8 GH/s.

One user questioned whether a DDoS is a sustainable response to the attack on Monero, and asked Ivancheglo for an estimate of its cost. Ivancheglo said it has no cost due to presumed control over the Monero-mining malware network by the attackers. “Zero cost, if you already have a botnet to mine Monero. So we are building protection assuming they can do it indefinitely,“ he said.

Read more

Source Link

Share with your friends!

Products You May Like

Leave a Reply

Your email address will not be published. Required fields are marked *


Fatal error: Uncaught wfWAFStorageFileException: Unable to verify temporary file contents for atomic writing. in /www/wwwroot/bitcoinnewsinvest.com/wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/storage/file.php:52 Stack trace: #0 /www/wwwroot/bitcoinnewsinvest.com/wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/storage/file.php(659): wfWAFStorageFile::atomicFilePutContents() #1 [internal function]: wfWAFStorageFile->saveConfig() #2 {main} thrown in /www/wwwroot/bitcoinnewsinvest.com/wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/storage/file.php on line 52