{"id":1648,"date":"2018-09-30T16:09:08","date_gmt":"2018-09-30T16:09:08","guid":{"rendered":"http:\/\/foongchengleong.com\/?p=1648"},"modified":"2018-09-30T16:09:08","modified_gmt":"2018-09-30T16:09:08","slug":"hijacking-hardware-in-stealth-mode","status":"publish","type":"post","link":"http:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/","title":{"rendered":"Hijacking hardware in stealth mode"},"content":{"rendered":"<p>I was featured by The Star in their article &#8220;<a href=\"https:\/\/www.thestar.com.my\/news\/nation\/2018\/08\/12\/hijacking-hardware-in-stealth-mode-a-few-msian-firms-have-fallen-victim-to-cybercriminals-who-take-o\/\" target=\"_blank\" rel=\"noopener\">Hijacking hardware in stealth mode<\/a>&#8220;. I was asked to comment about malicious cryptomining Malaysia.<\/p>\n<blockquote><p>Under our law, malicious cryptominers can be punished with the Computer Crimes Act 1997, says Bar Council information technology and cyberlaw committee deputy chairman Foong Cheng Leong.<\/p>\n<p>\u201cIt can be considered unauthorised access to computer material or unauthorised modification to computer material,\u201d he adds.<\/p>\n<p>If found guilty for unauthorised access, the cybercriminal can face up to a RM50,000 fine, a five-year jail term or both.<\/p>\n<p>At present, digital currencies such as bitcoin are not recognised as legal tender in Malaysia.<\/p>\n<p>But cryptocurrency exchangers are required to report their activities to Bank Negara.<\/p>\n<p>This reporting obligation, the central bank was reported as saying, is the first step in making activities in the cryptocurrency business more transparent.<\/p>\n<p>Foong says while it is not recognised as legal tender, it doesn\u2019t mean cryptocurrency is illegal.<\/p>\n<p>\u201cYou can still use digital currencies to purchase things. It is up to the buyer and seller,\u201d he adds.<\/p>\n<p>However, he points out that cryptocurrency may also be misused, particularly in the black market for illegal purposes like money laundering, purchase of drugs and other undesirable items, to avoid detection.<\/p>\n<p>\u201cI foresee more crimes and disputes may arise from there,\u201d Foong says.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>I was featured by The Star in their article &#8220;Hijacking hardware in stealth mode&#8220;. I was asked to comment about malicious cryptomining Malaysia. Under our law, malicious cryptominers can be punished with the Computer Crimes Act 1997, says Bar Council information technology and cyberlaw committee deputy chairman Foong Cheng Leong. \u201cIt can be considered unauthorised [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[753],"tags":[12,1121,1122,216],"class_list":["post-1648","post","type-post","status-publish","format-standard","hentry","category-information-technology","tag-computer-crimes-act-1997","tag-cryptocurrency","tag-cryptominers","tag-the-star"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hijacking hardware in stealth mode - Foong Cheng Leong<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hijacking hardware in stealth mode - Foong Cheng Leong\" \/>\n<meta property=\"og:description\" content=\"I was featured by The Star in their article &#8220;Hijacking hardware in stealth mode&#8220;. I was asked to comment about malicious cryptomining Malaysia. Under our law, malicious cryptominers can be punished with the Computer Crimes Act 1997, says Bar Council information technology and cyberlaw committee deputy chairman Foong Cheng Leong. \u201cIt can be considered unauthorised [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/\" \/>\n<meta property=\"og:site_name\" content=\"Foong Cheng Leong\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/FCLCo\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-30T16:09:08+00:00\" \/>\n<meta name=\"author\" content=\"FCL\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"FCL\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/hijacking-hardware-in-stealth-mode\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/hijacking-hardware-in-stealth-mode\\\/\"},\"author\":{\"name\":\"FCL\",\"@id\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/#\\\/schema\\\/person\\\/c3c6afdacad8d7eb10ab36074bb52c70\"},\"headline\":\"Hijacking hardware in stealth mode\",\"datePublished\":\"2018-09-30T16:09:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/hijacking-hardware-in-stealth-mode\\\/\"},\"wordCount\":221,\"commentCount\":0,\"keywords\":[\"Computer Crimes Act 1997\",\"cryptocurrency\",\"cryptominers\",\"The Star\"],\"articleSection\":[\"Information Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/hijacking-hardware-in-stealth-mode\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/hijacking-hardware-in-stealth-mode\\\/\",\"url\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/hijacking-hardware-in-stealth-mode\\\/\",\"name\":\"Hijacking hardware in stealth mode - Foong Cheng Leong\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/#website\"},\"datePublished\":\"2018-09-30T16:09:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/#\\\/schema\\\/person\\\/c3c6afdacad8d7eb10ab36074bb52c70\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/hijacking-hardware-in-stealth-mode\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/hijacking-hardware-in-stealth-mode\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/hijacking-hardware-in-stealth-mode\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hijacking hardware in stealth mode\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/#website\",\"url\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/\",\"name\":\"Foong Cheng Leong\",\"description\":\"Intellectual Property, Information Technology, Privacy and Data Protection and Franchise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/foongchengleong.com\\\/wp\\\/#\\\/schema\\\/person\\\/c3c6afdacad8d7eb10ab36074bb52c70\",\"name\":\"FCL\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/438af75bba3b98182ef9513e4efeaffd8bf31b2749815d3947be33cc75770ec0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/438af75bba3b98182ef9513e4efeaffd8bf31b2749815d3947be33cc75770ec0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/438af75bba3b98182ef9513e4efeaffd8bf31b2749815d3947be33cc75770ec0?s=96&d=mm&r=g\",\"caption\":\"FCL\"},\"sameAs\":[\"https:\\\/\\\/foongchengleong.com\\\/wp\"],\"url\":\"http:\\\/\\\/foongchengleong.com\\\/wp\\\/author\\\/xes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hijacking hardware in stealth mode - Foong Cheng Leong","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/","og_locale":"en_US","og_type":"article","og_title":"Hijacking hardware in stealth mode - Foong Cheng Leong","og_description":"I was featured by The Star in their article &#8220;Hijacking hardware in stealth mode&#8220;. I was asked to comment about malicious cryptomining Malaysia. Under our law, malicious cryptominers can be punished with the Computer Crimes Act 1997, says Bar Council information technology and cyberlaw committee deputy chairman Foong Cheng Leong. \u201cIt can be considered unauthorised [&hellip;]","og_url":"https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/","og_site_name":"Foong Cheng Leong","article_publisher":"https:\/\/www.facebook.com\/FCLCo","article_published_time":"2018-09-30T16:09:08+00:00","author":"FCL","twitter_card":"summary_large_image","twitter_misc":{"Written by":"FCL","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/#article","isPartOf":{"@id":"https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/"},"author":{"name":"FCL","@id":"https:\/\/foongchengleong.com\/wp\/#\/schema\/person\/c3c6afdacad8d7eb10ab36074bb52c70"},"headline":"Hijacking hardware in stealth mode","datePublished":"2018-09-30T16:09:08+00:00","mainEntityOfPage":{"@id":"https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/"},"wordCount":221,"commentCount":0,"keywords":["Computer Crimes Act 1997","cryptocurrency","cryptominers","The Star"],"articleSection":["Information Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/","url":"https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/","name":"Hijacking hardware in stealth mode - Foong Cheng Leong","isPartOf":{"@id":"https:\/\/foongchengleong.com\/wp\/#website"},"datePublished":"2018-09-30T16:09:08+00:00","author":{"@id":"https:\/\/foongchengleong.com\/wp\/#\/schema\/person\/c3c6afdacad8d7eb10ab36074bb52c70"},"breadcrumb":{"@id":"https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/foongchengleong.com\/wp\/hijacking-hardware-in-stealth-mode\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/foongchengleong.com\/wp\/"},{"@type":"ListItem","position":2,"name":"Hijacking hardware in stealth mode"}]},{"@type":"WebSite","@id":"https:\/\/foongchengleong.com\/wp\/#website","url":"https:\/\/foongchengleong.com\/wp\/","name":"Foong Cheng Leong","description":"Intellectual Property, Information Technology, Privacy and Data Protection and Franchise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/foongchengleong.com\/wp\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/foongchengleong.com\/wp\/#\/schema\/person\/c3c6afdacad8d7eb10ab36074bb52c70","name":"FCL","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/438af75bba3b98182ef9513e4efeaffd8bf31b2749815d3947be33cc75770ec0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/438af75bba3b98182ef9513e4efeaffd8bf31b2749815d3947be33cc75770ec0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/438af75bba3b98182ef9513e4efeaffd8bf31b2749815d3947be33cc75770ec0?s=96&d=mm&r=g","caption":"FCL"},"sameAs":["https:\/\/foongchengleong.com\/wp"],"url":"http:\/\/foongchengleong.com\/wp\/author\/xes\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/posts\/1648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/comments?post=1648"}],"version-history":[{"count":2,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/posts\/1648\/revisions"}],"predecessor-version":[{"id":1656,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/posts\/1648\/revisions\/1656"}],"wp:attachment":[{"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/media?parent=1648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/categories?post=1648"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/foongchengleong.com\/wp\/wp-json\/wp\/v2\/tags?post=1648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}