Sorry if this was already answered but if I'm using v 3.9 of the Claymore Miner am I susceptible to the following attack if I am using the default configuration with no command line switches defined for remote management or password?
https://www.bleepingcomputer.com/news/security/satori-botnet-is-now-attacking-ethereum-mining-rigs/
https://www.bleepingcomputer.com/news/security/satori-botnet-is-now-attacking-ethereum-mining-rigs/
Unless you use your mining computer for something other than mining i would think your OK. Its the folks with a couple of graphics cards in a gaming computer that i think would face the most risk.
I don't understand what you mean? According to that article the management port of the Claymore Windows CPU Miner (port 3333) was how this virus/hack was communicating with the mining computer and changing the configuration of the miner to mine for its own account instead of the owner of the mining computer. I use my computer for other things besides mining and have mining running in the background.
Let me ask these questions to try and get a better answer:
1. If I'm behind a router firewall and not doing any port forwarding to 3333 on my mining computer, would I be susceptible to this hack that is occuring?
2. If a virus got on a computer on my internal network that exploits this issues with the remote management port 3333 do I have to be concerned if I have not set the management port manually to -3333 or set a management password?
Thanks.