Understanding the Suspicion: Could a Vendor Have Installed a Cryptocurrency Mining Rig on Our Network?
In today’s interconnected world, safeguarding organizational networks from unexpected threats is more crucial than ever. Recently, a situation arose involving a seemingly innocuous device, raising concerns about unauthorized crypto-mining activities within a corporate environment. Here’s an in-depth look at the scenario, the concerns involved, and how organizations can approach such situations.
Background: Remote Monitoring Devices in the Workplace
Our organization utilizes remote temperature monitors installed throughout our facilities—specifically, within refrigeration units. These devices communicate via radio frequency (RF) signals, not Wi-Fi, broadcasting data to a central receiver connected to our network. This setup, managed by the vendor, enables us to monitor temperatures remotely via their platform, providing real-time data access from anywhere.
Transition and Hardware Changes
Earlier this year, the vendor announced a migration to a new platform, including the deployment of updated hardware. Interestingly, this upgrade came at a lower cost than previous arrangements—a beneficial change for our operations. However, during a recent office rearrangement, I observed the central receiver hardware in a different position. Notably, the device labeled “RAK HotSpot Miner V2.0”—a nomenclature unfamiliar in our context—caught my attention.
Investigating the Hardware: A Closer Look
Upon researching the “RAK HotSpot Miner V2.0,” I discovered a product marketed by RAK Wireless, typically used as a hotspot for decentralized wireless networks. The product page indicates that this device is part of the Helium network, which utilizes blockchain technology to incentivize the distribution of wireless coverage via cryptocurrency mining, notably for $HNT tokens.
Understanding the Technology
The RAK HotSpot Miner V2.0 functions as part of a mesh network—often called LongFi—for Internet of Things (IoT) devices. While designed for creating decentralized wireless networks, some mention that these devices can also be associated with blockchain-based mining activities. The device connects via RF to build the network’s infrastructure, and in the process, it may “mine” cryptocurrency by validating data transmissions.
Concerns and Considerations
The presence of this device in the workplace raises questions:
-
Is this hardware functioning solely as a network access point for IoT devices, or is it engaged in crypto-mining activity?
-
Could it be acting as an unauthorized access point, potentially exposing our network to vulnerabilities?
-
Is the company, intentionally or inadvertently, utilizing our internet and power resources for
Share this content: