Cryptocurrency
Hackers Fake Computational Power to Steal Cryptocurrencies Directly From Mining Pools
A new attack targeted equihash mining pools that use vulnerable equihashverifier to verify the miner’s shares. The logic vulnerability in the verifier...