I believe that the system could be accessed without credentials (you), and then some hacker got in and set up credentials and ran cryptocurrency mining software. The hacker was protecting 'his' server.
Not a member of The Register?
Create a new account
Remember me on this computer?
The Register Biting the hand that feeds IT
Copyright. All rights reserved © 1998–2023