See More

NiceHash Cuts Phoenix Miner on Security Fears

2 mins
Updated by James Hydzik
Join our Trading Community on Telegram

In Brief

  • NiceHash sent an urgent blog post about changes with Phoenix miner.
  • The miner's download location changed and the shasum does not match.
  • NiceHash does not recommend using any third-party mining software.
  • promo

The mining marketplace states that the source for Phoenix miner has changed, along with security mismatches.

NiceHash released a blog post warning the platform’s miners to stop using Phoenix miner immediately. The company noted the following problems with the anonymously developed software:

  • The Phoenix miner download location changed;
  • The control shasum does not match the published value.

NiceHash states that if Phoenix miner has been used on a PC, then to consider the computer to be compromised. It is recommended to reinstall the OS, change all passwords and activate 2FA. Moreover, move any funds in wallets attached to that PC to other wallets immediately.

Those needing mining software should avoid third-party software to begin with. NiceHash recommends using its QuickMiner variants. For further information, see this Reddit post, which came out just as this article was published.

Prior Experience

NiceHash is no stranger to hacks. In December 2020, the company finished paying back the last of the Bitcoin stolen in December 2017. In what seems to have been a spearfishing attack, hackers at that time made off with at least 4,640 BTC.

Hacks from Every Angle

The rising cryptocurrency market is attracting hackers, and miners have a lot of company as targets. The decentralized finance segment experiences hacks on a regular basis. On Mar. 7, PAID Network released the post-mortem concerning its Mar. 5 exploit. This hack saw more than 2,000 ETH gained as a result of unimpeded PAID mining and further selling-off. 


The Livecoin exchange experienced a hack that raised the price of Bitcoin to over $220,000 as the attack evolved. Livecoin subsequently closed, and the hack may have been an exit scam.

Better Security

One safeguard regarding the constant hacking that everyone in the cryptocurrency community can help with is better security. Taking basic steps can prevent a portion of attacks from succeeding.

For example, the PAID Network exploit resulted at least in part from security lapses at the network. Contract changes needed only one signature. WARONRUGS called for PAID Network to utilize multisig processes at sensitive points as early as January 2021.

While in many cases, users who fall victim to hacking are often reimbursed, this is not always the case. Exchanges and other companies put out the call regarding breaches as quickly as they can. They also expect users to pay attention, and getting money back on transactions made after a hack has been announced is highly unlikely.

Top crypto platforms in the US | March 2024
Coinbase Coinbase Explore →
AlgosOne AlgosOne Explore →
Chain GPT Chain GPT Explore →
iTrustCapital iTrustCapital Explore →

Trusted

Disclaimer

In adherence to the Trust Project guidelines, BeInCrypto is committed to unbiased, transparent reporting. This news article aims to provide accurate, timely information. However, readers are advised to verify facts independently and consult with a professional before making any decisions based on this content. Please note that our Terms and ConditionsPrivacy Policy, and Disclaimers have been updated.

James-Hydzik.jpg
James Hydzik
James Hydzik is a finance and technology writer and editor based in Kyiv, Ukraine. He is especially interested in the development of regulation in the face of increasingly rapid technological change. He previously covered the CEE region for Financial Times banking and FDI magazines. An ardent believer in gut renovating eastern Europe one flat at a time, he currently holds more home renovation gear than crypto.
READ FULL BIO
Sponsored
Sponsored