Gaming Network turned Into Bitcoin Mine


SUBMITTED BY: Guest

DATE: May 9, 2013, 5:32 a.m.

FORMAT: Text only

SIZE: 3.5 kB

HITS: 1356

  1. Rogue Employee Turns Gaming Network Into Private Bitcoin Mine.
  2. If you’ve been playing Counter-Strike on the ESEA gaming network,
  3. you’ve been doing a lot more than tossing virtual hand grenades
  4. and firing virtual machine guns. You’ve been mining Bitcoins for
  5. an unnamed staffer inside the company that runs the network.
  6. The mining started on April 13 and may have affected as many as 14,000 gamers.
  7. ESEA distributes “anti-cheat” software that allows subscribers to play the
  8. Counter-Strike first-person shooter game on their network.
  9. The software gives players better data on their game play and cuts down on
  10. the use of known game cheats, which can give opponents an unfair advantage.
  11. The network has close to 14,000 paying customers, according to co-founder
  12. Craig Levine. He isn’t sure how many customers had their machines used for
  13. mining, however.
  14. Last month, ESEA started toying with the idea of adding a Bitcoin mining
  15. option to its anti-cheat client, but shelved the idea on April 12, Levine
  16. said in an e-mailed statement.
  17. But the next day, an employee went ahead and started distributing the code
  18. “for his own personal gain,” Levine says.
  19. “What transpired the past two weeks is a case of an employee acting on his
  20. own and without authorization to access our community through our company’s
  21. resources. As of this morning, ESEA has made sure that all Bitcoin mining
  22. has stopped. ESEA is also in the process of taking all necessary steps
  23. internally to ensure that nothing like this ever happens again.”
  24. The surreptitious mining was discovered yesterday by an ESEA user.
  25. The company’s story about what happened has changed somewhat since then.
  26. Initially, ESEA described the mining as a sort of April Fool’s prank gone wrong.
  27. Yesterday, co-founder Eric Thunberg said that the mining started after a
  28. technical glitch occurred with test code that staffers had been toying with.
  29. But Levine now says that Thunberg’s post was based on incorrect information.
  30. “It was posted based on inaccurate information Eric got at the time,” Levine says.
  31. “Upon our further investigation, the situation obviously turned out to be more
  32. severe that we were initially led on to believe.”
  33. In the Bitcoin world, people with access to large compute resources can earn
  34. money by adding processing power to the digital currency’s peer-to-peer network.
  35. It’s a business that’s become increasingly lucrative and competitive in the past
  36. few months as more powerful Bitcoin mining computers have come online.
  37. But the graphics processors found on gaming systems are pretty good at mining Bitcoins,
  38. and the ESEA employee did OK for himself. In just a couple of weeks, he netted close
  39. to BTC30, or about $3,700.
  40. Without more details, it’s hard to say whether ESEA violated the Computer Fraud and
  41. Abuse Act, which makes it a crime to intentionally or recklessly cause damage to
  42. someone’s computer. But there’s no question that the secret mining was wrong,
  43. says Kurt Opsahl, a senior staff attorney with the Electronic Frontier Foundation.
  44. “This certainly is something they shouldn’t have done,” he says.
  45. “And it’s a word of caution to users”
  46. ESEA says it’s going to donate its employee’s ill-gotten Bitcoin haul to
  47. the American Cancer Society and will match the donation from its own funds.

comments powered by Disqus