Bitcoin Forum

Other => Meta => Topic started by: theymos on May 25, 2015, 02:39:49 PM



Title: About the recent server compromise
Post by: theymos on May 25, 2015, 02:39:49 PM
On May 22 at 00:56 UTC, an attacker gained root access to the forum's server. He then proceeded to try to acquire a dump of the forum's database before I noticed this at around 1:08 and shut down the server. In the intervening time, it seems that he was able to collect some or all of the "members" table. You should assume that the following information about your account was leaked:
- Email address
- Password hash (see below)
- Last-used IP address and registration IP address
- Secret question and a basic (not brute-force-resistant) hash of your secret answer
- Various settings

As such, you should change your password here and anywhere else you used that same password. You should disable your secret question and assume that the attacker now knows your answer to your secret question. You should prepare to receive phishing emails at your forum email address.

While nothing can ever be ruled out in these sorts of situations, I do not believe that the attacker was able to collect any personal messages or other sensitive data beyond what I listed above.

Passwords are hashed with 7500 rounds of sha256crypt. This is pretty good, but certainly not beyond attack. Note that even though SHA-256 is used here, sha256crypt is different enough from Bitcoin's SHA-256d PoW algorithm that Bitcoin mining ASICs almost certainly cannot be modified to crack forum passwords.

I will now go into detail about how well you can expect your password to fare against a determined attacker. However, regardless of how strong your password is, the only prudent course of action is for you to immediately change your password here and everywhere else you used it or a similar password.

The following table shows how long it will take on average for a rather powerful attacker to recover RANDOM passwords using current technology, depending on the password's alphabet and length. If your password is not completely random (ie. generated with the help of dice or a computer random number generator), then you should assume that your password is already broken.

It is not especially helpful to turn words into leetspeak or put stuff between words. If you have a password like "w0rd71Voc4b", then you should count that as just 2 words to be safe. In reality, your extra stuff will slow an attacker down, but the effect is probably much less than you'd think. Again, the times listed in the table only apply if the words were chosen at random from a word list. If the words are significant in any way, and especially if they form a grammatical sentence or are a quote from a book/webpage/article/etc., then you should consider your password to be broken.

Code:
Estimated time (conservative) for an attacker to break randomly-constructed
bitcointalk.org passwords with current technology

s=second; m=minute; h=hour; d=day; y=year; ky=1000 years; My=1 million years

Password length  a-z  a-zA-Z  a-zA-Z0-9  <all standard>
              8    0      3s        12s              2m
              9    0      2m        13m              3h
             10   8s      2h        13h             13d
             11   3m      5d        34d              1y
             12   1h    261d         3y            260y
             13   1d     37y       366y            22ky
             14  43d   1938y       22ky             1My
             15   1y   100ky        1My           160My
-------------------------------------------------------
         1 word  0
        2 words  0
        3 words  0
        4 words  3m
        5 words  19d
        6 words  405y
        7 words  3My

Each password has its own 12-byte random salt, so it isn't possible to attack more than one password with the same work. If it takes someone 5 days to recover your password, that time will all have to be spent on your password. Therefore, it's likely that only weak passwords will be recovered en masse -- more complicated passwords will be recovered only in targeted attacks against certain people.

If your account is compromised due to this, email acctcomp15@theymos.e4ward.com from the email that was previously associated with your account.

For security reasons, I deleted all drafts. If you need a deleted draft, contact me soon and I can probably give it to you.

A few people might have broken avatars now. Just upload your avatar again to fix it.

Unproxyban fee processing isn't working right now. If you want to register and you can't, get someone to post in Meta for you and you'll be whitelisted.

Searching is temporarily disabled, though it won't be disabled for as long as last time because I improved the reindexing code.

If you changed your password in the short time when the forum was online a little over a day ago, the change didn't stick. You'll have to change it again.

How the compromise happened:

The attacker was able to acquire KVM access credentials for the server. The investigation into how this was possible is still ongoing, so I don't know everything, and I don't yet want to publish everything that I do know, but it seems almost certain that it was a problem on the ISP's end.

After he got KVM access, the attacker convinced the ISP NFOrce that he was me (using his KVM access as part of his evidence) and said that he had locked himself out of the server. So NFOrce reset the server's root password for him, giving him complete access to the server and bypassing most of our carefully-designed security measures. I originally assumed that the attacker gained access entirely via social engineering, but later investigation showed that this was probably only part of the overall attack. As far as I know, NFOrce's overall security practices are no worse than average.

To reduce downtime and avoid temporarily-broken features, I was originally going to stay in NFOrce's data center. However, some things made me suspicious and I moved everything elsewhere. That's where the extra day+ of downtime came from after a short period of uptime. No additional data was leaked.

The forum will pay up to 15 XAU (converted to BTC) for information about the attacker's real-world identity. Exact payment amounts will depend on the quality and usefulness of information as well as what information I've already acquired, but if for example you're the first person to contact me and your info allows me to successfully prosecute this person, then you will get the full 15 XAU. You need to actually convince me that your info is accurate -- just sending me someone's name is useless.

The attacker used the following IPs/email:
37.48.77.227
66.172.27.160
lopaz291@safe-mail.net


Title: Re: About the recent server compromise
Post by: LondonMP on May 25, 2015, 02:41:27 PM
Thank you Theymos for your hard work


Title: Re: About the recent server compromise
Post by: DailyModo on May 25, 2015, 02:43:57 PM
Thanks for your hard work to keep this forum safe from hackers
Hats off


Title: Re: About the recent server compromise
Post by: ajareselde on May 25, 2015, 02:48:45 PM
Well i sure hope thats that, and we can just reset our pass, and leave this behind us. Good thing that there's not more damage done.
Nicely done, Theymos

cheers


Title: Re: About the recent server compromise
Post by: Check-0 on May 25, 2015, 02:48:57 PM
so where is our update on Twitter about that "all is fine" ?!
Prove that you are real Theymos ?


Title: Re: About the recent server compromise
Post by: LFC_Bitcoin on May 25, 2015, 02:50:58 PM
Disgraceful that it's happened again imo.
We're having to change passwords & change email addresses.
I've just closed down the email account I first used as it has some sensitive info on.
Not the first time this has happened either.
Heads need to roll over this  ;D
Hope nobody had any coins stolen over this.


Title: Re: About the recent server compromise
Post by: Amph on May 25, 2015, 02:54:40 PM
it must be someone internal, i can't believe everytime there is someone from the outside, that can hack a forum like this, and like nothing

i still think someone gave to him the info for login


Title: Re: About the recent server compromise
Post by: Insert_Bitcoin on May 25, 2015, 02:55:50 PM
You got a lot done for only a few days of down time. Have you slept yet?


Title: Re: About the recent server compromise
Post by: foxkyu on May 25, 2015, 02:56:21 PM
Thank you Theymos for your hardwork :)
hope it's not going down again for the long time. this is the longest downtime ever i know since i register here last year
cmiiw


Title: Re: About the recent server compromise
Post by: SpanishSoldier on May 25, 2015, 02:58:22 PM
The attacker used the following IPs/email:
37.48.77.227
66.172.27.160
lopaz291@safe-mail.net

Seems Tor IP. Did he mail you anything ? If yes, may we get to know the content ?


Title: Re: About the recent server compromise
Post by: Quickseller on May 25, 2015, 03:00:04 PM
so where is our update on Twitter about that "all is fine" ?!
Prove that you are real Theymos ?
I would prefer a GPG signed message over a twitter message for confirmation, however theymos did send out a GPG signed email advising to change your passwords when he last brought the forum online (the signature was good and was signed within minutes of the google timestamp of this thread previously being created). The google cashe of this thread says that theymos had encrypted the DB to prevent a similar attack in the future. Your password should be considered to be compromised regardless.

I would personally avoid doing any kind of business on here until theymos can prove his identity. I would also suggest treating anyone you deal with to be an imposter until you can get either a GPG or bitcoin signed message to confirm their identity.
Thanks theymos for all the time/effort you put into this

edit: it appears that theymos has changed the HTTPS keys and GPG signed the new keys earlier today.

Quote
gpg: Signature made Mon May 25 10:53:03 2015 EDT using DSA key ID DAB591E7
gpg: Good signature from "Michael Marquardt <michael_m+pgp@mm.st>"
gpg:                 aka "theymos <theymos+pgp@mm.st>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 5E6B 3F3B A961 193C 5C9B  4435 C655 5693 DAB5 91E7


Title: Re: About the recent server compromise
Post by: Check-0 on May 25, 2015, 03:00:29 PM
so where is our update on Twitter about that "all is fine" ?!
Prove that you are real Theymos ?
NO update on Twitter or Reddit.
We assume that you are fake theymos.
Nice done hacking man !


Title: Re: About the recent server compromise
Post by: mitzie on May 25, 2015, 03:02:36 PM
so where is our update on Twitter about that "all is fine" ?!
Prove that you are real Theymos ?
NO update on Twitter or Reddit.
We assume that you are fake theymos.
Nice done hacking man !
It's ok, don't worry. We have spoken with the "real" one


Title: Re: About the recent server compromise
Post by: okae on May 25, 2015, 03:04:45 PM
Thank you Theymos&Staff for your hard work!!

i already change my password, just in case ;)


You got a lot done for only a few days of down time. Have you slept yet?

jaja i hope so, btw before sleep, drink some beer ;)


Title: Re: About the recent server compromise
Post by: galbros on May 25, 2015, 03:07:18 PM
First and foremost thanks for the forum, it is unfortunate that it has become such a target.

Second, thanks for laying all this out.  I especially appreciate the table of how long to crack our passwords.  I have to admit, I'm a little shocked at how easy they are to crack.

Good luck to you!


Title: Re: About the recent server compromise
Post by: Quickseller on May 25, 2015, 03:07:25 PM
The attacker used the following IPs/email:
37.48.77.227
66.172.27.160
lopaz291@safe-mail.net

Seems Tor IP. Did he mail you anything ? If yes, may we get to know the content ?
What are you talking about? Neither IP address shows up as a tor exit node (https://check.torproject.org/exit-addresses).

66.172.27.160 has very little information on it's WHOIS, however the company Cyberverse, Inc. does show up and their website (http://www.cyberverse.com/) does show both colocation and cloud services offered by them. It appears that only credit card payments are accepted (more importantly bitcoin does not appear to be accepted), so there is a good chance that (assuming that a similar attack was not launched against them) this could be a lead.

edit: it appears that ChunkHost also shows up in the above WHOIS and according to their blog (https://chunkhost.com/blog), it appears they accept Bitcoin. Their website is also not less professional then Cyberverse so it is possible they simply are hosted by Cyberverse and the attacker was using ChunkHost :/


Title: Re: About the recent server compromise
Post by: marcotheminer on May 25, 2015, 03:08:49 PM
Launch the new forum Theymos, come on! We were supposed to see something concrete by the end of February.. It's been 3 months!


Title: Re: About the recent server compromise
Post by: achow101_alt on May 25, 2015, 03:08:59 PM
]I would prefer a GPG signed message over a twitter message for confirmation, however theymos did send out a GPG signed email advising to change your passwords when he last brought the forum online (the signature was good and was signed within minutes of the google timestamp of this thread previously being created). The google cashe of this thread says that theymos had encrypted the DB to prevent a similar attack in the future. Your password should be considered to be compromised regardless.

I would personally avoid doing any kind of business on here until theymos can prove his identity. I would also suggest treating anyone you deal with to be an imposter until you can get either a GPG or bitcoin signed message to confirm their identity.
Thanks theymos for all the time/effort you put into this
What was the message of the email, since I can't find any email from Bitcointalk or Theymos.


Title: Re: About the recent server compromise
Post by: LFC_Bitcoin on May 25, 2015, 03:09:57 PM
Why can't 1.5 million USD donated in bitcoin protect this forum from attack?
Is there any proof that the entire 1.5 million went into this forum & not into theymos' Carribean Island retirement pot?
Wallet transactions etc?


Title: Re: About the recent server compromise
Post by: CanaryInTheMine on May 25, 2015, 03:10:18 PM
The number of security breaches is unacceptable... It's now a joke theymos...


Title: Re: About the recent server compromise
Post by: Quickseller on May 25, 2015, 03:12:39 PM
]I would prefer a GPG signed message over a twitter message for confirmation, however theymos did send out a GPG signed email advising to change your passwords when he last brought the forum online (the signature was good and was signed within minutes of the google timestamp of this thread previously being created). The google cashe of this thread says that theymos had encrypted the DB to prevent a similar attack in the future. Your password should be considered to be compromised regardless.

I would personally avoid doing any kind of business on here until theymos can prove his identity. I would also suggest treating anyone you deal with to be an imposter until you can get either a GPG or bitcoin signed message to confirm their identity.
Thanks theymos for all the time/effort you put into this
What was the message of the email, since I can't find any email from Bitcointalk or Theymos.
Quote from: theymos via email
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

You are receiving this message because your email address is associated
with an account on bitcointalk.org. I regret to have to inform you that
some information about your account was obtained by an attacker who
successfully compromised the bitcointalk.org server. The following
information about your account was likely leaked:
 - Email address
 - Password hash
 - Last-used IP address and registration IP address
 - Secret question and a basic (not brute-force-resistant) hash of your
 secret answer
 - Various settings

You should immediately change your forum password and delete or change
your secret question. To do this, log into the forum, click "profile",
and then go to "account related settings".

If you used the same password on bitcointalk.org as on other sites, then
you should also immediately change your password on those other sites.
Also, if you had a secret question set, then you should assume that the
attacker now knows the answer to your secret question.

Your password was salted and hashed using sha256crypt with 7500 rounds.
This will slow down anyone trying to recover your password, but it will
not completely prevent it unless your password was extremely strong.

While nothing can ever be ruled out in these sorts of situations, I do
not believe that the attacker was able to collect any forum personal
messages.

I apologize for the inconvenience and for any trouble that this may cause.
-----BEGIN PGP SIGNATURE-----

iF4EAREIAAYFAlVhiGIACgkQxlVWk9q1keeUmgEAhGi8pTghxISo1feeXkUMhW3a
uKxLeOOkTQR5Zh7aGKoBAMEvYsGEBGt3hzInIh+k43XJjGYywSiPAal1KI7Arfs0
=bvuI
-----END PGP SIGNATURE-----


Title: Re: About the recent server compromise
Post by: marcotheminer on May 25, 2015, 03:12:44 PM
Why can't 1.5 million USD donated in bitcoin protect this forum from attack?
Is there any proof that the entire 1.5 million went into this forum & not into theymos' Carribean Island retirement pot?
Wallet transactions etc?

We all wish there were.


Title: Re: About the recent server compromise
Post by: dogie on May 25, 2015, 03:14:28 PM
Passwords and secret questions can be changed here: https://bitcointalk.org/index.php?action=profile;sa=account.

Also
1) Is there any information on what the additional suspicion was?
2) Was there any content / PM rollbacks?


Title: Re: About the recent server compromise
Post by: locopao on May 25, 2015, 03:14:57 PM
Thanks theymos & bitcointalk stuff for getting the forum back online.

Hope you get the m@therf@ckers and make them pay. In any way.


Title: Re: About the recent server compromise
Post by: Check-0 on May 25, 2015, 03:15:23 PM
https://twitter.com/bitcointalk/status/602421967291985920 ???  :-\


Title: Re: About the recent server compromise
Post by: achow101_alt on May 25, 2015, 03:15:40 PM
The attacker used the following IPs/email:
37.48.77.227
66.172.27.160
lopaz291@safe-mail.net

Seems Tor IP. Did he mail you anything ? If yes, may we get to know the content ?
What are you talking about? Neither IP address shows up as a tor exit node (https://check.torproject.org/exit-addresses).
That list is for the most recent list of exit nodes which updates every hour. I would suggest looking here: https://collector.torproject.org/formats.html#exit-lists for archived lists from the past few days to see if one of the ips was an exit when the attack occurred.


Title: Re: About the recent server compromise
Post by: achow101_alt on May 25, 2015, 03:18:00 PM
https://twitter.com/bitcointalk/status/602421967291985920 ???  :-\
The tweet for those who didn't follow the link:
Quote
@bitcointalk Non-authoritative answer:
Name: http://bitcointalk.org
Address: 186.2.165.183 : this means attackers use DNS Poisoning ...
According to the OP, Theymos changed from his previous host NForce to another host because of suspicious activity. This would explain the IP change.

Edit: Found the quote:
Quote
To reduce downtime and avoid temporarily-broken features, I was originally going to stay in NFOrce's data center. However, some things made me suspicious and I moved everything elsewhere. That's where the extra day+ of downtime came from after a short period of uptime. No additional data was leaked.


Title: Re: About the recent server compromise
Post by: seoincorporation on May 25, 2015, 03:21:46 PM
Is great to have the forum back again thx theymos.

The attack was weird because at last we don't know how he got access to the KVM...

I will give here some possible scenarios.

*Forum admins join to the forum from an insecure point and the forum was compromised.
*Attacker was on the same modem with admins and make a Man in the middle attack.
*Attacker hack the ISP provider before hack the forum.
*There is a 0 day what only the attacker know.

And maybe all that points are wrong... I think if we don't find the source of the problem, it is not fixed yet.


Title: Re: About the recent server compromise
Post by: Lethn on May 25, 2015, 03:22:27 PM
I realise this is a no brainer for a lot of people, but you should never link your financial accounts and website passwords with ones you use on social networks and forums like this one. The only thing these guys are going to get from me are a maybe a few passwords to my gaming stuff but that's it, I think because of how many times Bitcointalk keeps getting compromised it's probably wise to create a unique password just for this site as it's probably going to keep happening the more Bitcoin grows.

There are clearly people out there that think they'll be able to get some from Bitcointalk or maybe this is more malicious than that and they're deliberately trying to bring the site down, either way, there shouldn't be anything sensitive on here and if there is people should move it fast.


Title: Re: About the recent server compromise
Post by: erikalui on May 25, 2015, 03:23:02 PM
Thanks theymos for the hardwork. I changed my password but not my email ID as I'm not sure if I should do it as the pwd used on this forum wasn't used anywhere else fortunately. I've not received any phishing email except this one yesterday:


You are receiving this message because your email address is associated
with an account on bitcointalk.org.

-----BEGIN PGP SIGNATURE-----

iF4EAREIAAYFAlVhiGI..........................

I hope the above message is genuine.


Title: Re: About the recent server compromise
Post by: niktitan132 on May 25, 2015, 03:24:24 PM
I have changed my password and secret questions.Hopefully there will be no downtime,again.

@Theymos When will the new forum be launched?  ;D


Title: Re: About the recent server compromise
Post by: teddy5145 on May 25, 2015, 03:24:36 PM
Thank you for keeping this site safe  :)
Maybe you could invest in some kind better security in the future? just in case something like this happening again
and im still trying to figure out what's the motive of the attacker to attack this site  :-\


Title: Re: About the recent server compromise
Post by: Check-0 on May 25, 2015, 03:25:04 PM
https://twitter.com/bitcointalk/status/602421967291985920 ???  :-\
The tweet for those who didn't follow the link:
Quote
@bitcointalk Non-authoritative answer:
Name: http://bitcointalk.org
Address: 186.2.165.183 : this means attackers use DNS Poisoning ...
According to the OP, Theymos changed from his previous host NForce to another host because of suspicious activity. This would explain the IP change.

Edit: Found the quote:
Quote
To reduce downtime and avoid temporarily-broken features, I was originally going to stay in NFOrce's data center. However, some things made me suspicious and I moved everything elsewhere. That's where the extra day+ of downtime came from after a short period of uptime. No additional data was leaked.

that IP was in Russia, where BTC is illegal
http://en.wikipedia.org/wiki/Legality_of_bitcoin_by_country
strange choice of hoster IMHO.


Title: Re: About the recent server compromise
Post by: BtcTalkAcct on May 25, 2015, 03:26:12 PM
What is theymos's GPG key? Is it published somewhere official? I received the signed email but I can't find a verified source with the key.


Title: Re: About the recent server compromise
Post by: RappelzReborn on May 25, 2015, 03:26:27 PM
Why can't 1.5 million USD donated in bitcoin protect this forum from attack?
Is there any proof that the entire 1.5 million went into this forum & not into theymos' Carribean Island retirement pot?
Wallet transactions etc?

There is actually , here is his wallet as far as I know : https://blockchain.info/address/1M4yNbSCwSMFLF9BaLqzoo2to1WHtZrPke
Source is from here , those are people who are helding the money of the forum (which is not out yet ) : https://bitcointalk.org/index.php?topic=155000.0

@Theymos , thanks for your hard work .. a question tho ... if we don't change password and that password isn't the same as our email adresses then we should be good right ? just curious i will change my pass anyway


Title: Re: About the recent server compromise
Post by: Moebius327 on May 25, 2015, 03:28:56 PM
theymos, thank you for you hard work. Let's hope we will not have to deal this in the future.


Title: Re: About the recent server compromise
Post by: Gervais on May 25, 2015, 03:29:06 PM
@Theymos , thanks for your hard work .. a question tho ... if we don't change password and that password isn't the same as our email adresses then we should be good right ? just curious i will change my pass anyway

No, you should change it because it could be broken eventually especially if it was a weak password. I wouldn't take any chances.


Title: Re: About the recent server compromise
Post by: TheTommyD on May 25, 2015, 03:30:16 PM
Would not 2fa protected this from occurring?


Title: Re: About the recent server compromise
Post by: MakingMoneyHoney on May 25, 2015, 03:30:54 PM
Thank you for keeping this site safe  :)
Maybe you could invest in some kind better security in the future? just in case something like this happening again
and im still trying to figure out what's the motive of the attacker to attack this site  :-\

If they get an email/password combo figured out, they could have passed them self off as a well respected member and done deals where they get money and run. Or, just use the email/password to log into a bank account, or exchange account and withdraw the money. One of the main things is to use a unique password for each site. Lastpass.com is good for that, if anyone hasn't heard of them.


Title: Re: About the recent server compromise
Post by: nearmint on May 25, 2015, 03:33:09 PM
He might not want 2fa because it lowers conversion rate. Less people would use the forum and the forum's only strength is its community. BUT the forum would be still big enough after 2fa. It's a classic in the scene, so ppl will continue to use it. I would use it with 2fa :D


Title: Re: About the recent server compromise
Post by: Vod on May 25, 2015, 03:34:48 PM
Received my first spam email last night.   :-[


Title: Re: About the recent server compromise
Post by: Blazed on May 25, 2015, 03:36:05 PM
Waiting for all of the sig spammers to make up for lost time!


Title: Re: About the recent server compromise
Post by: Muhammed Zakir on May 25, 2015, 03:36:36 PM
Thank you, theymos! Keep up the good work!

Anyone going after the hacker?

Would not 2fa protected this from occurring?

2FA will be in the new forum software but now, I think, implementing in current software will be good.


Title: Re: About the recent server compromise
Post by: TheTommyD on May 25, 2015, 03:36:43 PM
He might not want 2fa because it lowers conversion rate. Less people would use the forum and the forum's only strength is its community. BUT the forum would be still big enough after 2fa. It's a classic in the scene, so ppl will continue to use it. I would use it with 2fa :D

Sorry, I meant 2fa for server access.


Title: Re: About the recent server compromise
Post by: dogie on May 25, 2015, 03:37:35 PM
He might not want 2fa because it lowers conversion rate. Less people would use the forum and the forum's only strength is its community. BUT the forum would be still big enough after 2fa. It's a classic in the scene, so ppl will continue to use it. I would use it with 2fa :D

He doesn't need to make 2fa mandatory, just an option.


Received my first spam email last night.   :-[

Welcome to hotmail, where spam emails are the only emails :D


Title: Re: About the recent server compromise
Post by: Xialla on May 25, 2015, 03:38:42 PM
uhh already received spam also + many unsuccessful attempts to mail login:(

anyway, thanks for bring the forum up.


Title: Re: About the recent server compromise
Post by: saddampbuh on May 25, 2015, 03:40:23 PM
dont think im important enough on here to want to hack but changed pass anyway


Title: Re: About the recent server compromise
Post by: FanEagle on May 25, 2015, 03:41:16 PM
Thanks for always keeping us protected, I love this forum.  ::)


Title: Re: About the recent server compromise
Post by: Amph on May 25, 2015, 03:41:36 PM
theymos, thank you for you hard work. Let's hope we will not have to deal this in the future.


until the new forum is set(one can think that the forum will have some instrument against those kind of attack, maybe a better privacy, better ISP, that don't leak your root credentials...), i do think it will happen again, this isn't the first time after all


Title: Re: About the recent server compromise
Post by: LFC_Bitcoin on May 25, 2015, 03:46:14 PM
Received my first spam email last night.   :-[
Have you not changed the email you linked to this site mate?
I have & I've deleted the other account.
Never use an email that you have banking details, card details etc in.


Title: Re: About the recent server compromise
Post by: Xialla on May 25, 2015, 03:48:45 PM
Have you not changed the email you linked to this site mate? I have & I've deleted the other account.

wtf you are talking about? mail addresses are already leaked, so even you will change the mail here, you will get spam..


Title: Re: About the recent server compromise
Post by: hilariousandco on May 25, 2015, 03:49:02 PM
uhh already received spam also + many unsuccessful attempts to mail login:(

anyway, thanks for bring the forum up.

What spam did you get? Has anyone else had attempts to compromise their email?


Title: Re: About the recent server compromise
Post by: BadBear on May 25, 2015, 03:49:24 PM
Thanks theymos for the hardwork. I changed my password but not my email ID as I'm not sure if I should do it as the pwd used on this forum wasn't used anywhere else fortunately. I've not received any phishing email except this one yesterday:


You are receiving this message because your email address is associated
with an account on bitcointalk.org.

-----BEGIN PGP SIGNATURE-----

iF4EAREIAAYFAlVhiGI..........................

I hope the above message is genuine.

It is.

Signed on 2015-05-24 04:14 by michael_m+pgp@mm.st (Key ID: 0xDAB591E7).
The signature is valid and the certificate's validity is fully trusted.

What is theymos's GPG key? Is it published somewhere official? I received the signed email but I can't find a verified source with the key.

All PGP keys are hosted on public keyservers. They're also hosted on the forum's servers, though you shouldn't rely on that solely. https://bitcointalk.org/theymos.asc, https://bitcointalk.org/BadBear.asc

https://pgp.mit.edu/pks/lookup?search=theymos&op=index

For the record.

Code:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Confirming Badbear is Badbear, and not Goodbear or other variations of bears.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBAgAGBQJVY0O5AAoJEKAjO3S1eXxPH40H/jvkkJhKUVxKB6a1whLFE08p
jIJi3qw1WkZPFkM9QWwNXNq+8p8bZxiC+0mIskITUiZBwLqgHgyogFf5FjWNnhSy
lhhmLLh6L+LxXtXg+6kITn2nEPiP+wiZRXkRWwzqRd5mh8c3I1hMMfnYa9DarQG3
hC+TjJXwHKvdYXL5FjcGv4HXGX0QMhXUzwodF05SWXJmH6v8uG3vn6QFej4XRVPd
kWWHh61GlzUAZix0EOxd/cvElgJW6Y8sWl/gH5qBnqhnHDTVnS4/cnQVLjgScyGF
QXVoLZG71Mjkgq+PFX8GRqatKIt/vzMvhBYz7DKKDM8NNzbLRRVexlb2MnpeTx8=
=QK2I
-----END PGP SIGNATURE-----


 


Title: Re: About the recent server compromise
Post by: TheTommyD on May 25, 2015, 03:54:06 PM
uhh already received spam also + many unsuccessful attempts to mail login:(

anyway, thanks for bring the forum up.

What spam did you get? Has anyone else had attempts to compromise their email?

NO I Have Not received any Spam from this. Fortunately, I signed up with a unique cloaked email address so If I got one it would show (Cloaked in my in-box)


Title: Re: About the recent server compromise
Post by: randy8777 on May 25, 2015, 03:54:16 PM
i have changed my password to make sure my account is safe. this shows that you must never use a password in more than 1 place.


Title: Re: About the recent server compromise
Post by: LFC_Bitcoin on May 25, 2015, 03:54:53 PM
Have you not changed the email you linked to this site mate? I have & I've deleted the other account.

wtf you are talking about? mail addresses are already leaked, so even you will change the mail here, you will get spam..
I closed the email account I 'was' using here.
There wasn't much else on there any way but I'd rather be safe than sorry.
Can they do anything with our IP addresses?


Title: Re: About the recent server compromise
Post by: Leeroy Jenkins on May 25, 2015, 03:55:41 PM
Interesting compromise. I am amazed this can still happen. Good luck to anyone looking for the attacker(s).


Title: Re: About the recent server compromise
Post by: Xialla on May 25, 2015, 03:58:41 PM
uhh already received spam also + many unsuccessful attempts to mail login:(

anyway, thanks for bring the forum up.

What spam did you get? Has anyone else had attempts to compromise their email?

something like "buy iphone with btc" or "some viagra with btc" and similar..

I dunno, if it is related, but I had this acc for years and I never received similar mails until yesterday. coming from some non-sense yahoo addresses.


Title: Re: About the recent server compromise
Post by: Xialla on May 25, 2015, 04:00:00 PM
Can they do anything with our IP addresses?

ahh depends if you had public one (unique, reachable from outside) or some NAT IP which is covering subnets of ISP..


Title: Re: About the recent server compromise
Post by: sgk on May 25, 2015, 04:00:53 PM
uhh already received spam also + many unsuccessful attempts to mail login:(

anyway, thanks for bring the forum up.

What spam did you get? Has anyone else had attempts to compromise their email?

something like "buy iphone with btc" or "some viagra with btc" and similar..

I dunno, if it is related, but I had this acc for years and I never received similar mails until yesterday. coming from some non-sense yahoo addresses.

It is possible the attacker is selling the stolen email address database to spammers to make quick bucks.


Title: Re: About the recent server compromise
Post by: dogie on May 25, 2015, 04:01:40 PM
Can they do anything with our IP addresses?

Yeah, DDOS you out of digital existence. Which is why I don't think the forum should have added a "Skype username" box on people's profiles. Its just asking for revenge DDOSing.


Title: Re: About the recent server compromise
Post by: tarsua on May 25, 2015, 04:02:39 PM
Thanks for the info theymos, i'll have a crack at tracking his email and ip although im sure the email is fake and he used a proxy


Title: Re: About the recent server compromise
Post by: Xialla on May 25, 2015, 04:03:42 PM
It is possible the attacker is selling the stolen email address database to spammers to make quick bucks.

ahh, I really don't wanna start any drama. maybe it was just spam in "wrong time" and it is not related at all. just reporting..:)


Title: Re: About the recent server compromise
Post by: cbase on May 25, 2015, 04:04:04 PM
uhh already received spam also + many unsuccessful attempts to mail login:(

anyway, thanks for bring the forum up.

What spam did you get? Has anyone else had attempts to compromise their email?

something like "buy iphone with btc" or "some viagra with btc" and similar..

I dunno, if it is related, but I had this acc for years and I never received similar mails until yesterday. coming from some non-sense yahoo addresses.

It is possible the attacker is selling the stolen email address database to spammers to make quick bucks.


Not very much worth it if the reason of the attacker is just to get emails list, it must be sonething else and it might be the attacker is looking for private datas


Title: Re: About the recent server compromise
Post by: minifrij on May 25, 2015, 04:05:47 PM
Glad that it's back, but as previously said it's fairly unacceptable that a forum with such a security aura can still be compromised by attackers.
When will the new forum be happening? It's been in speculation for at least a year, if not longer now. It cannot take this long to code a forum software.

Yeah, DDOS you out of digital existence.
Do you think that they would bother? Surely to take down as many people as it would be worth here it would take more resources than what the attacker could get back.


Title: Re: About the recent server compromise
Post by: AGD on May 25, 2015, 04:13:37 PM
It is possible the attacker is selling the stolen email address database to spammers to make quick bucks.

ahh, I really don't wanna start any drama. maybe it was just spam in "wrong time" and it is not related at all. just reporting..:)

This doesn't look like the average email spam hack to me.


Title: Re: About the recent server compromise
Post by: Welsh on May 25, 2015, 04:14:45 PM
Unfortunatly this seems to be a reoccuring issue. Again, good job in minimising the damage done. Keep us up to date on the situation regarding how they obtained the information needed to gain access.


Title: Re: About the recent server compromise
Post by: thebitcoinquiz.com on May 25, 2015, 04:18:25 PM
I guess the password changes which were done yesterday (when the forum cane online for a few hours) were reverted back, cause I changed my password yesterday but I had to use my previous password to login today. Idk why was it done.

Also, is it just me or the forum looks plain to everyone? Like I am not able to identify what has changed by the layout looks a bit flat.


Title: Re: About the recent server compromise
Post by: opentoe on May 25, 2015, 04:19:41 PM
On May 22 at 00:56 UTC, an attacker gained root access to the forum's server. He then proceeded to try to acquire a dump of the forum's database before I noticed this at around 1:08 and shut down the server. In the intervening time, it seems that he was able to collect some or all of the "members" table. You should assume that the following information about your account was leaked:
- Email address
- Password hash (see below)
- Last-used IP address and registration IP address
- Secret question and a basic (not brute-force-resistant) hash of your secret answer
- Various settings

As such, you should change your password here and anywhere else you used that same password. You should disable your secret question and assume that the attacker now knows your answer to your secret question. You should prepare to receive phishing emails at your forum email address.

While nothing can ever be ruled out in these sorts of situations, I do not believe that the attacker was able to collect any personal messages or other sensitive data beyond what I listed above.

Passwords are hashed with 7500 rounds of sha256crypt. This is pretty good, but certainly not beyond attack. Note that even though SHA-256 is used here, sha256crypt is different enough from Bitcoin's SHA-256d PoW algorithm that Bitcoin mining ASICs almost certainly cannot be modified to crack forum passwords.

I will now go into detail about how well you can expect your password to fare against a determined attacker. However, regardless of how strong your password is, the only prudent course of action is for you to immediately change your password here and everywhere else you used it or a similar password.

The following table shows how long it will take on average for a rather powerful attacker to recover RANDOM passwords using current technology, depending on the password's alphabet and length. If your password is not completely random (ie. generated with the help of dice or a computer random number generator), then you should assume that your password is already broken.

It is not especially helpful to turn words into leetspeak or put stuff between words. If you have a password like "w0rd71Voc4b", then you should count that as just 2 words to be safe. In reality, your extra stuff will slow an attacker down, but the effect is probably much less than you'd think. Again, the times listed in the table only apply if the words were chosen at random from a word list. If the words are significant in any way, and especially if they form a grammatical sentence or are a quote from a book/webpage/article/etc., then you should consider your password to be broken.

Code:
Estimated time (conservative) for an attacker to break randomly-constructed
bitcointalk.org passwords with current technology

s=second; m=minute; h=hour; d=day; y=year; ky=1000 years; My=1 million years

Password length  a-z  a-zA-Z  a-zA-Z0-9  <all standard>
              8    0      3s        12s              2m
              9    0      2m        13m              3h
             10   8s      2h        13h             13d
             11   3m      5d        34d              1y
             12   1h    261d         3y            260y
             13   1d     37y       366y            22ky
             14  43d   1938y       22ky             1My
             15   1y   100ky        1My           160My
-------------------------------------------------------
         1 word  0
        2 words  0
        3 words  0
        4 words  3m
        5 words  19d
        6 words  405y
        7 words  3My

Each password has its own 12-byte random salt, so it isn't possible to attack more than one password with the same work. If it takes someone 5 days to recover your password, that time will all have to be spent on your password. Therefore, it's likely that only weak passwords will be recovered en masse -- more complicated passwords will be recovered only in targeted attacks against certain people.

If your account is compromised due to this, email acctcomp15@theymos.e4ward.com from the email that was previously associated with your account.

For security reasons, I deleted all drafts. If you need a deleted draft, contact me soon and I can probably give it to you.

A few people might have broken avatars now. Just upload your avatar again to fix it.

Unproxyban fee processing isn't working right now. If you want to register and you can't, get someone to post in Meta for you and you'll be whitelisted.

Searching is temporarily disabled, though it won't be disabled for as long as last time because I improved the reindexing code.

If you changed your password in the short time when the forum was online a little over a day ago, the change didn't stick. You'll have to change it again.

How the compromise happened:

The attacker was able to acquire KVM access credentials for the server. The investigation into how this was possible is still ongoing, so I don't know everything, and I don't yet want to publish everything that I do know, but it seems almost certain that it was a problem on the ISP's end.

After he got KVM access, the attacker convinced the ISP NFOrce that he was me (using his KVM access as part of his evidence) and said that he had locked himself out of the server. So NFOrce reset the server's root password for him, giving him complete access to the server and bypassing most of our carefully-designed security measures. I originally assumed that the attacker gained access entirely via social engineering, but later investigation showed that this was probably only part of the overall attack. As far as I know, NFOrce's overall security practices are no worse than average.

To reduce downtime and avoid temporarily-broken features, I was originally going to stay in NFOrce's data center. However, some things made me suspicious and I moved everything elsewhere. That's where the extra day+ of downtime came from after a short period of uptime. No additional data was leaked.

The forum will pay up to 15 XAU (converted to BTC) for information about the attacker's real-world identity. Exact payment amounts will depend on the quality and usefulness of information as well as what information I've already acquired, but if for example you're the first person to contact me and your info allows me to successfully prosecute this person, then you will get the full 15 XAU. You need to actually convince me that your info is accurate -- just sending me someone's name is useless.

The attacker used the following IPs/email:
37.48.77.227
66.172.27.160
lopaz291@safe-mail.net

Thanks for the info, but don't you think it is time you really take some of those donations and upgrade this forum software? There are quite a few new styles out there that are really nice. This pretty much static version has been around and looked the same since it was installed. And last year when there was a thread about how you had so much bitcoin worth millions of dollars I think it was, you wanted other user's to hold on to it in case some of it was lost. Why can't you take some of those donations, build a brand new dedicated box, hire one of the best programmers you can find and get this forum software out of the dark ages?



Title: Re: About the recent server compromise
Post by: theymos on May 25, 2015, 04:20:02 PM
I guess the password changes which were done yesterday (when the forum cane online for a few hours) were reverted back, cause I changed my password yesterday but I had to use my previous password to login today. Idk why was it done.

Right, you should change your password again.

Also, is it just me or the forum looks plain to everyone? Like I am not able to identify what has changed by the layout looks a bit flat.

Your eyes got used to looking at other websites besides this one.


Title: Re: About the recent server compromise
Post by: botany on May 25, 2015, 04:21:27 PM
I guess the password changes which were done yesterday (when the forum cane online for a few hours) were reverted back, cause I changed my password yesterday but I had to use my previous password to login today. Idk why was it done.


Yup, you will have to change it again.


If you changed your password in the short time when the forum was online a little over a day ago, the change didn't stick. You'll have to change it again.


Title: Re: About the recent server compromise
Post by: Morecoin Freeman on May 25, 2015, 04:22:02 PM
Fucking hackers >:(


Title: Re: About the recent server compromise
Post by: locopao on May 25, 2015, 04:25:47 PM
Hey guys!

One more thing: DON'T FORGET TO CHECK YOUR WALLET ADDRESS, TOO!!! IN YOUR PROFILE.

This is most important for users already participating in campaigns (FOR AUTOMATED PAID campaigns like bitmixer etc)

Hacker would easily check the participants accounts and just change the payment address to his own, in order to receive the payments.

 ;)


Title: Re: About the recent server compromise
Post by: botany on May 25, 2015, 04:28:58 PM
Hey guys!

One more thing: DON'T FORGET TO CHECK YOUR WALLET ADDRESS, TOO!!! IN YOUR PROFILE.

This is most important for users already participating in campaigns (FOR AUTOMATED PAID campaigns like bitmixer etc)

Hacker would easily check the participants accounts and just change the payment address to his own, in order to receive the payments.

 ;)

A hacker after small change.  ;D
Good joke. :)


Title: Re: About the recent server compromise
Post by: TheTommyD on May 25, 2015, 04:29:35 PM
I just changed mine: 01100110 01110101 01100011 01101011 01111001 01101111 01110101 01110011 01110000 01100001 01101101 01101101 01100101 01110010


Title: Re: About the recent server compromise
Post by: nor9865 on May 25, 2015, 04:32:37 PM
wait a minute .

lopaz???

thats a player of World of Warcraft. you should look into that

if anyone who has the admin login and password has been in WoW recently make sure someone did not install a keylogger or a backdoor in your computer and was able to get the log in and password or some way to perform the attack.

also it is impossible that the forum is so at risk considering the number of times i have seen it down or been attacked. it is becoming a joke now.

you should accelerate into the new forum with more security rather than leaning over this one. the new forum was announced for a while now.


Title: Re: About the recent server compromise
Post by: locopao on May 25, 2015, 04:32:52 PM
Hey guys!

One more thing: DON'T FORGET TO CHECK YOUR WALLET ADDRESS, TOO!!! IN YOUR PROFILE.

This is most important for users already participating in campaigns (FOR AUTOMATED PAID campaigns like bitmixer etc)

Hacker would easily check the participants accounts and just change the payment address to his own, in order to receive the payments.

 ;)

A hacker after small change.  ;D
Good joke. :)

I am sure you just checked yours  ;D

Seriously, i agree it's just small change for someone to get in all this trouble just to steal some coins, but on the other hand, how many campaigns & participants are in total? So it might not be just changes.



Title: Re: About the recent server compromise
Post by: hilariousandco on May 25, 2015, 04:33:18 PM
Thanks for the info, but don't you think it is time you really take some of those donations and upgrade this forum software? There are quite a few new styles out there that are really nice. This pretty much static version has been around and looked the same since it was installed. And last year when there was a thread about how you had so much bitcoin worth millions of dollars I think it was, you wanted other user's to hold on to it in case some of it was lost. Why can't you take some of those donations, build a brand new dedicated box, hire one of the best programmers you can find and get this forum software out of the dark ages?



It's almost complete and is being tested now. There's a subforum for the discussion of it: https://bitcointalk.org/index.php?board=167.0


Title: Re: About the recent server compromise
Post by: dbshck on May 25, 2015, 04:34:15 PM

Thanks for the info, but don't you think it is time you really take some of those donations and upgrade this forum software? There are quite a few new styles out there that are really nice. This pretty much static version has been around and looked the same since it was installed. And last year when there was a thread about how you had so much bitcoin worth millions of dollars I think it was, you wanted other user's to hold on to it in case some of it was lost. Why can't you take some of those donations, build a brand new dedicated box, hire one of the best programmers you can find and get this forum software out of the dark ages?

This is exactly what theymos is doing right now. Not sure why you haven't notice it, but we're currently developing a brand new forum software with the best programmers since 2014. There is a dedicated subforum for the new forum software https://bitcointalk.org/index.php?board=167.0
You can also check out the progress on Github https://github.com/epochtalk/epochtalk


Title: Re: About the recent server compromise
Post by: opentoe on May 25, 2015, 04:36:55 PM
Why can't 1.5 million USD donated in bitcoin protect this forum from attack?
Is there any proof that the entire 1.5 million went into this forum & not into theymos' Carribean Island retirement pot?
Wallet transactions etc?

There is actually , here is his wallet as far as I know : https://blockchain.info/address/1M4yNbSCwSMFLF9BaLqzoo2to1WHtZrPke
Source is from here , those are people who are helding the money of the forum (which is not out yet ) : https://bitcointalk.org/index.php?topic=155000.0

@Theymos , thanks for your hard work .. a question tho ... if we don't change password and that password isn't the same as our email adresses then we should be good right ? just curious i will change my pass anyway

That's just one donation wallet. It was supposed to be spread around last year when bitcoin was really high. So you may want to at least triple that number. 6 million dollars in donations. Although we will never know the true numbers. He just happen to be at the right place, right time. BAM and people donated like crazy to keep the site up. I'm not complaining, because I donated myself (knowing the forum had millions of dollars) but really thought security and features, and updates would be top priority here. You can have the sweetest forum running on the Internet. I say try out discourse.


Title: Re: About the recent server compromise
Post by: squall1066 on May 25, 2015, 04:37:30 PM
Thanks for the info,

If our account still gets compromised, are you still able to revert permissions back with a PGP btc address to confirm user?


Title: Re: About the recent server compromise
Post by: dogie on May 25, 2015, 04:38:10 PM
Glad that it's back, but as previously said it's fairly unacceptable that a forum with such a security aura can still be compromised by attackers.
When will the new forum be happening? It's been in speculation for at least a year, if not longer now. It cannot take this long to code a forum software.

Yeah, DDOS you out of digital existence.
Do you think that they would bother? Surely to take down as many people as it would be worth here it would take more resources than what the attacker could get back.

Yes because a) people are malicious and b) it costs them nothing. There are plenty of "stress test your website" sites that use botnets to do evil things when asked to, either for free or a small fee. The attacker gets nothing other than "winning" the argument.


Title: Re: About the recent server compromise
Post by: marcotheminer on May 25, 2015, 04:39:14 PM
Hey guys!

One more thing: DON'T FORGET TO CHECK YOUR WALLET ADDRESS, TOO!!! IN YOUR PROFILE.

This is most important for users already participating in campaigns (FOR AUTOMATED PAID campaigns like bitmixer etc)

Hacker would easily check the participants accounts and just change the payment address to his own, in order to receive the payments.

 ;)

A hacker after small change.  ;D
Good joke. :)

Over 5 BTC a week wouldn't be that tiny.


Title: Re: About the recent server compromise
Post by: sgk on May 25, 2015, 04:41:20 PM
It is possible the attacker is selling the stolen email address database to spammers to make quick bucks.

ahh, I really don't wanna start any drama. maybe it was just spam in "wrong time" and it is not related at all. just reporting..:)

This doesn't look like the average email spam hack to me.

It definitely isn't. The hacker was downloading the complete members table which allows him to compromise many user accounts on this forum as well as other sites.

Selling email addresses might be a side income for him with no extra effort until he brute-forces the passwords.


Title: Re: About the recent server compromise
Post by: theymos on May 25, 2015, 04:43:38 PM
If our account still gets compromised, are you still able to revert permissions back with a PGP btc address to confirm user?

Yes. I also have a database snapshot from a little before the attack which I can use to verify people by email if necessary.


Title: Re: About the recent server compromise
Post by: timk225 on May 25, 2015, 04:46:50 PM
15 XAU....how much is that in US Dollars?  If it isn't enough for me I will not tell what I know about the attack.  Hint -- it came from China.  They are trying to counterfeit and steal everything in the world, and it seems like no one tries to stop them.

My password was a single keyboard character repeated 10 times, maybe I should change it?

And no amount of security in the world will stop this if some dumbass at the data center believes what someone on the phone tells him and resets the access password.


Title: Re: About the recent server compromise
Post by: hilariousandco on May 25, 2015, 04:49:22 PM
15 XAU....how much is that in US Dollars? 

http://www.xe.com/currency/xau-gold-ounce


Title: Re: About the recent server compromise
Post by: Xialla on May 25, 2015, 04:50:38 PM
15 XAU....how much is that in US Dollars?  If it isn't enough for me I will not tell what I know about the attack.  Hint -- it came from China.  They are trying to counterfeit and steal everything in the world, and it seems like no one tries to stop them.

My password was a single keyboard character repeated 10 times, maybe I should change it?

And no amount of security in the world will stop this if some dumbass at the data center believes what someone on the phone tells him and resets the access password.

1 XAU = ~ 1200USD

rest of post is just bullshit, sorry.


Title: Re: About the recent server compromise
Post by: nor9865 on May 25, 2015, 04:53:11 PM
15 XAU....how much is that in US Dollars?  If it isn't enough for me I will not tell what I know about the attack.  Hint -- it came from China.  They are trying to counterfeit and steal everything in the world, and it seems like no one tries to stop them.

My password was a single keyboard character repeated 10 times, maybe I should change it?

And no amount of security in the world will stop this if some dumbass at the data center believes what someone on the phone tells him and resets the access password.


XAU is Gold

Quote
XAU-USD 1,206.9400 Price of 1 XAU in USD


Title: Re: About the recent server compromise
Post by: alani123 on May 25, 2015, 05:07:51 PM
What's the limit for passwords? I tried using an unreasonably large string as my password and didn't receive any error messages (despite the load time after I press the login button being huge). Were the last characters of the string cut off for it to fit a certain limit?


Title: Re: About the recent server compromise
Post by: matt4054 on May 25, 2015, 05:09:33 PM
I'm quoting this for those like me who didn't understand why they couldn't login after changing pwd yesterday

If you changed your password in the short time when the forum was online a little over a day ago, the change didn't stick. You'll have to change it again.


Title: Re: About the recent server compromise
Post by: 1Referee on May 25, 2015, 05:18:41 PM
As far as I can see no one had access to my account. I have set a stronger password just in case. Better safe than sorry. Credits to theymos for his hard work.


Title: Re: About the recent server compromise
Post by: Panthers52 on May 25, 2015, 05:24:33 PM
I am glad that too much damage wasn't done and that too much personal information wasn't leaked. This is just one more example of the importance of using GPG when sending or receiving any kind of sensitive information.


Title: Re: About the recent server compromise
Post by: Lauda on May 25, 2015, 05:46:28 PM
I am glad that too much damage wasn't done and that too much personal information wasn't leaked. This is just one more example of the importance of using GPG when sending or receiving any kind of sensitive information.
Actually there is quite some damage. Passwords are irrelevant,as they can be changed.
A lot of people are going to be targeted due to this
Quote
- Last-used IP address and registration IP address
There are people who sometimes use a VPN, and some that don't use it at all. We will see what happens in the future.
Hopefully the attacker gets found.


Title: Re: About the recent server compromise
Post by: Fernandez on May 25, 2015, 05:47:53 PM
I was using a moderately strong password which I could remember too. Now I will have to come with another system.


Title: Re: About the recent server compromise
Post by: Panthers52 on May 25, 2015, 05:51:05 PM
I am glad that too much damage wasn't done and that too much personal information wasn't leaked. This is just one more example of the importance of using GPG when sending or receiving any kind of sensitive information.
Actually there is quite some damage. Passwords are irrelevant,as they can be changed.
A lot of people are going to be targeted due to this
Quote
- Last-used IP address and registration IP address
There are people who sometimes use a VPN, and some that don't use it at all. We will see what happens in the future.
Hopefully the attacker gets found.
I am not sure why anyone would consider not using a VPN. They are really not very expensive to use and they provide a lot of added privacy.


Title: Re: About the recent server compromise
Post by: 1Referee on May 25, 2015, 05:53:33 PM
I am glad that too much damage wasn't done and that too much personal information wasn't leaked. This is just one more example of the importance of using GPG when sending or receiving any kind of sensitive information.
Actually there is quite some damage. Passwords are irrelevant,as they can be changed.
A lot of people are going to be targeted due to this
Quote
- Last-used IP address and registration IP address
There are people who sometimes use a VPN, and some that don't use it at all. We will see what happens in the future.
Hopefully the attacker gets found.

For most people it doesn't matter if their IP address is now in the hands of the hacker, they will most likely target those with the highest ranks and based on how important that person is in the community.


Title: Re: About the recent server compromise
Post by: btcdealer.nl on May 25, 2015, 05:57:39 PM
9800 Savage Rd
Fort Meade, MD 20755
USA

 ;)


Title: Re: About the recent server compromise
Post by: alani123 on May 25, 2015, 06:02:36 PM
9800 Savage Rd
Fort Meade, MD 20755
USA

 ;)

What is this?


Title: Re: About the recent server compromise
Post by: btcdealer.nl on May 25, 2015, 06:05:33 PM
9800 Savage Rd
Fort Meade, MD 20755
USA

 ;)

What is this?

Address of the most loved agency in this world :P


Title: Re: About the recent server compromise
Post by: Xialla on May 25, 2015, 06:10:32 PM
9800 Savage Rd
Fort Meade, MD 20755
USA

 ;)

What is this?

NSA address my friend.


Title: Re: About the recent server compromise
Post by: alani123 on May 25, 2015, 06:13:23 PM
Oh I see, Nsa.gov...


Title: Re: About the recent server compromise
Post by: galdur on May 25, 2015, 06:15:34 PM
Well, nothing amiss here it seems. Changed the password. No suspicious emails received so far. Looks like it´s back to plain sailing. Good luck, g


Title: Re: About the recent server compromise
Post by: AgentofCoin on May 25, 2015, 06:19:56 PM
This might be a dumb question, but why aren't emails also hashed on the server?
(If the user decides not to display it in their own profile, the only people who know it is the user, mods, and the server).


Title: Re: About the recent server compromise
Post by: damm315er on May 25, 2015, 06:24:26 PM
https://twitter.com/#!/2256561481/status/602900410647580672


Title: Re: About the recent server compromise
Post by: BDCoinMiner on May 25, 2015, 06:25:49 PM
Welcome Back!

Just out of curiosity, I wander what could be the possible 'gain' for attacker by attacking BCT forum, other then mental satisfaction ?

Yes, a lots of user contact data, related to CryptoCurrency  which can be use for other phishing attack...

Other then above, what could be the 'direct' gain he/she/they (The attacker) had in mind at time of attacking??

Cheers!


Title: Re: About the recent server compromise
Post by: marcotheminer on May 25, 2015, 06:29:22 PM
Welcome Back!

Just out of curiosity, I wander what could be the possible 'gain' for attacker by attacking BCT forum, other then mental satisfaction ?

Yes, a lots of user contact data, related to CryptoCurrency  which can be use for other phishing attack...

Other then above, what could be the 'direct' gain he/she/they (The attacker) had in mind at time of attacking??

Cheers!

Gaining access to accounts and scamming with them or selling them. Also spamming emails.


Title: Re: About the recent server compromise
Post by: MakingMoneyHoney on May 25, 2015, 06:30:00 PM
Welcome Back!

Just out of curiosity, I wander what could be the possible 'gain' for attacker by attacking BCT forum, other then mental satisfaction ?

Yes, a lots of user contact data, related to CryptoCurrency  which can be use for other phishing attack...

Other then above, what could be the 'direct' gain he/she/they (The attacker) had in mind at time of attacking??

Cheers!

If someone used the same username/password with email/online banking accounts/exchanges they could log in and withdraw the money, or use password resets to the email account and withdraw money.

This is a nice read on how easy someone can use some information to get past other checkpoints, such as 2FA - http://www.theverge.com/a/anatomy-of-a-hack


Title: Re: About the recent server compromise
Post by: itod on May 25, 2015, 06:30:50 PM
Whoever claims theymos is not doing a great job with this forum should consider this forum is probably one of the most attacked ones because attackers potentially have so much to gain in the financial sense. Consider also that a lot of security expertise lurks around the forum. When you look at it this way, the amount of successful attacks is quite low, TBH. Keep up the good work, theymos.


Title: Re: About the recent server compromise
Post by: alani123 on May 25, 2015, 06:35:15 PM
Whoever claims theymos is not doing a great job with this forum should consider this forum is probably one of the most attacked ones because attackers potentially have so much to gain in the financial sense. Consider also that a lot of security expertise lurks around the forum. When you look at it this way, the amount of successful attacks is quite low, TBH. Keep up the good work, theymos.
To also look at the other side, it's not the first time the forum gets attacked. The previous attacks were done with the intention to deface the website though, (probably) no attempt to steal information. This must be the first time someone attacks the sole forum with the intention of stealing user information.


Title: Re: About the recent server compromise
Post by: dogie on May 25, 2015, 06:36:36 PM
I was using a moderately strong password which I could remember too. Now I will have to come with another system.

LastPass is a good idea for generating passwords you don't need to remember. You'll need to remember one complex password but then it'll store any others you need. [Link] (https://lastpass.com/) | [Link with referral ID which gives both of us 1 free month premium] (https://lastpass.com/f?11992496).


Title: Re: About the recent server compromise
Post by: TinEye on May 25, 2015, 06:36:51 PM
9800 Savage Rd
Fort Meade, MD 20755
USA

 ;)

What is this?

Address of the most loved agency in this world :P

No Such Agency?


Title: Re: About the recent server compromise
Post by: dogie on May 25, 2015, 06:39:09 PM
9800 Savage Rd
Fort Meade, MD 20755
USA

 ;)

What is this?

Address of the most loved agency in this world :P

No Such Agency?

No Secrets Allowed.
Never Say Akbar.

So many good variants.


Title: Re: About the recent server compromise
Post by: bitcoin_bagholder on May 25, 2015, 06:44:25 PM
It was a very tense login moment today to find out if I still had access to the account, must've been doubly so for those in a signature campaign.

Victory.  :P


Title: Re: About the recent server compromise
Post by: caitsith2 on May 25, 2015, 07:03:31 PM
I was using a moderately strong password which I could remember too. Now I will have to come with another system.

LastPass is a good idea for generating passwords you don't need to remember. You'll need to remember one complex password but then it'll store any others you need. [Link] (https://lastpass.com/) | [Link with referral ID which gives both of us 1 free month premium] (https://lastpass.com/f?11992496).

Totally agree.  According to the table,  my 16 random AZaz09  is effectively not going to be cracked by those black-hats any time soon. :)


Title: Re: About the recent server compromise
Post by: damm315er on May 25, 2015, 07:04:44 PM

No Secrets Allowed.
Never Say Akbar.

So many good variants.

LOL @ Never say

Not Smart Actually
Negative Security Agency
Nothing Secure Anymore
National in-Security Agenda


Title: Re: About the recent server compromise
Post by: solstoce on May 25, 2015, 07:06:46 PM
Good work theymos glad u got the server shut down quickly!


Title: Re: About the recent server compromise
Post by: notlist3d on May 25, 2015, 07:09:28 PM
Theymos thank you for dealing with all this during a holiday weekend.   It sounds like a lot of work put in over this mess.

Also what I think is great of you is putting a good reward out there.  I thank you most for this.  I hope whoever did this someone knows and will turn them in for the reward.  Guess time will tell.  But I hope actionable information comes in.


Title: Re: About the recent server compromise
Post by: RappelzReborn on May 25, 2015, 07:14:37 PM
Why can't 1.5 million USD donated in bitcoin protect this forum from attack?
Is there any proof that the entire 1.5 million went into this forum & not into theymos' Carribean Island retirement pot?
Wallet transactions etc?

There is actually , here is his wallet as far as I know : https://blockchain.info/address/1M4yNbSCwSMFLF9BaLqzoo2to1WHtZrPke
Source is from here , those are people who are helding the money of the forum (which is not out yet ) : https://bitcointalk.org/index.php?topic=155000.0

@Theymos , thanks for your hard work .. a question tho ... if we don't change password and that password isn't the same as our email adresses then we should be good right ? just curious i will change my pass anyway

That's just one donation wallet. It was supposed to be spread around last year when bitcoin was really high. So you may want to at least triple that number. 6 million dollars in donations. Although we will never know the true numbers. He just happen to be at the right place, right time. BAM and people donated like crazy to keep the site up. I'm not complaining, because I donated myself (knowing the forum had millions of dollars) but really thought security and features, and updates would be top priority here. You can have the sweetest forum running on the Internet. I say try out discourse.

Check the second link , all the other adresses are available .
But yes you got a point . We still waiting for this new forum which should cost 1.5m dollar and I'am really thinking it's a lot more then it should cost . but ... Simple Machines is not that good but vBulletin is made by professionals I don't know why we aren't using that , and we can use like 100k $ max to Upgrade and Hire developpers and programmers to do the security stuff etc .
So I guess we just should wait for epochtalk and see how things goes It may be able to compeet the other forum softwares such vb,mybb etc ...


Title: Re: About the recent server compromise
Post by: Cryddit on May 25, 2015, 07:28:21 PM
What's the limit for passwords? I tried using an unreasonably large string as my password and didn't receive any error messages (despite the load time after I press the login button being huge). Were the last characters of the string cut off for it to fit a certain limit?

No, the last characters are not cut off, at least not at any "reasonable" password length.  My password here is over 60 characters, and it still cares about whether the last character is entered. 


Title: Re: About the recent server compromise
Post by: RoadStress on May 25, 2015, 07:37:43 PM
Theymos please make the notice for changing the password more visible. Maybe bold it or put it in red. Right now I find it very easy to miss it.


Title: Re: About the recent server compromise
Post by: TheButterZone on May 25, 2015, 07:45:33 PM
If anyone wants to change their IP address exposed in the hack, the method I just used was to edit the MAC ID that my modem sees, and rebooted everything. A new WAN IP was issued. Check https://whatismyip.com before and after this procedure.

Even if you have a dynamically-assigned IP, you will likely get the same one again, if all you do is reboot without changing your MAC ID.


Title: Re: About the recent server compromise
Post by: alani123 on May 25, 2015, 07:50:54 PM
What's the limit for passwords? I tried using an unreasonably large string as my password and didn't receive any error messages (despite the load time after I press the login button being huge). Were the last characters of the string cut off for it to fit a certain limit?

No, the last characters are not cut off, at least not at any "reasonable" password length.  My password here is over 60 characters, and it still cares about whether the last character is entered. 

I used a 2024 character string though. Not the most reasonable password length eh? I was pretty surprised to see that there wasn't any warning or error message and that's why I came here to ask if there's any limit.


Title: Re: About the recent server compromise
Post by: Cryddit on May 25, 2015, 07:52:00 PM
Over the last four days attempts to log into the email address I use here have been up about 20% relative to the average 4-day period over the previous month. I do not use the same password I used here for anything else but for what it's worth I hope they burn every bit of comp time they've got trying to crack it.  ;D  

I've also gotten some very good spear-phishing recently, one of which took the "message from your ISP" thing to the next level by using the name/e-mail address of an actual real employee at my ISP, and another of which used an address that is held by a family member.  That's a lot more upsetting to me than the fake-login attempts.  

I have no idea whether the bump in activity has anything to do with the recent breach here.  But it's interesting.

Theymos: Good job.  I know exactly how hard it is keeping something up when the environment turns hostile, and these people saying this number of breaches is unacceptable - have no idea what it's like dealing with an "advanced, persistent, targeted threat."  The level of attacks and attempts something like this attracts is beyond what most ISP's are willing and able to deal with, and beyond a certain level of complexity all software leaks.   This forum having a public face means taking a lot of stuff head-on, and given that your up-time record is acually pretty awesome.


Title: Re: About the recent server compromise
Post by: redsn0w on May 25, 2015, 07:57:51 PM
Thanks theymos, I have changed my password yesterday and also today... and I hope to be 'safe' (a big word) now ;).   XAU for his real identity, it is a lot of money.... and I do not think he is stupid (he made a soc. engir. attack... only a few people are able to do it).


PS: however good luck with the search.


Title: Re: About the recent server compromise
Post by: erikalui on May 25, 2015, 08:09:04 PM
Now I started receiving spam emails from maximeco******@gma and some vayne*****@gmail.com. Any way to report these emails or ban these users' accounts as they seem to be the hackers.


Title: Re: About the recent server compromise
Post by: hilariousandco on May 25, 2015, 08:12:05 PM
Now I started receiving spam emails from maximeco******@gma and some vayne*****@gmail.com. Any way to report these emails or ban these users' accounts as they seem to be the hackers.

Of course they can be reported to your email provider but blocking out the emails doesn't do much good for the forum to be able to do anything about it not that they could anyway as they likely wont be linked to accounts here.


Title: Re: About the recent server compromise
Post by: Welsh on May 25, 2015, 08:15:05 PM
Thanks theymos, I have changed my password yesterday and also today... and I hope to be 'safe' (a big word) now ;).   XAU for his real identity, it is a lot of money.... and I do not think he is stupid (he made a soc. engir. attack... only a few people are able to do it).


PS: however good luck with the search.

You'd probably be suprised by how easy some people can trick others into giving them sensitive information. I've seen it done on a much smaller scale and all it took was a little bit of confidence. There's also been reports over the years of simple techniques used against big companies and much more sensitive data.


Title: Re: About the recent server compromise
Post by: MadGamer on May 25, 2015, 08:15:11 PM
Beside our emails and passwords of course ... how bad it could be when the hackers have this "Last-used IP address and registration IP address" , im not an expert or anything but don't the IP change each time we reboot the modem ? :o Probably not the IP range but well


Title: Re: About the recent server compromise
Post by: Slaine on May 25, 2015, 08:16:41 PM
Well I couldn't get into my account and for a while it looked like the password recovery wasn't working.

Thankfully I don't reuse passwords, but it's always a good wake up call to just go through and refresh your passwords on anything vaguely important once in a while..


Title: Re: About the recent server compromise
Post by: erikalui on May 25, 2015, 08:19:11 PM
Now I started receiving spam emails from maximeco******@gma and some vayne*****@gmail.com. Any way to report these emails or ban these users' accounts as they seem to be the hackers.

Of course they can be reported to your email provider but blocking out the emails doesn't do much good for the forum to be able to do anything about it not that they could anyway as they likely wont be linked to accounts here.

I have reported the emails to theymos and hope that he can track those accounts and take an action soon. I don't know how to report it to my email provider. I just clicked "Report Spam."


Title: Re: About the recent server compromise
Post by: redsn0w on May 25, 2015, 08:22:41 PM
Thanks theymos, I have changed my password yesterday and also today... and I hope to be 'safe' (a big word) now ;).   XAU for his real identity, it is a lot of money.... and I do not think he is stupid (he made a soc. engir. attack... only a few people are able to do it).


PS: however good luck with the search.

You'd probably be suprised by how easy some people can trick others into giving them sensitive information. I've seen it done on a much smaller scale and all it took was a little bit of confidence. There's also been reports over the years of simple techniques used against big companies and much more sensitive data.

Yes I am surprised and I know that a 100% security doesn't really exist but c'mon... we are talking about a big service provider and it should not be easy to trick them (in my honest opinion) but everything is possible. The real problem is always the people, you can build the security that you want but you are fuc**ed if an employee will reset the pwd http://techforum.it/styles/default/xenforo/smilies/asd.gif.


Title: Re: About the recent server compromise
Post by: alani123 on May 25, 2015, 08:24:19 PM
Beside our emails and passwords of course ... how bad it could be when the hackers have this "Last-used IP address and registration IP address" , im not an expert or anything but don't the IP change each time we reboot the modem ? :o Probably not the IP range but well

This depends on your ISP. Having your modem/router closed overnight usually does the job. If you didn't login during the short time that the forum was back up but then went offline again then I'm guessing that you most certainly should have a new IP address than the one last used to login.


Title: Re: About the recent server compromise
Post by: MadGamer on May 25, 2015, 08:25:13 PM
Thanks theymos, I have changed my password yesterday and also today... and I hope to be 'safe' (a big word) now ;).   XAU for his real identity, it is a lot of money.... and I do not think he is stupid (he made a soc. engir. attack... only a few people are able to do it).


PS: however good luck with the search.

You'd probably be suprised by how easy some people can trick others into giving them sensitive information. I've seen it done on a much smaller scale and all it took was a little bit of confidence. There's also been reports over the years of simple techniques used against big companies and much more sensitive data.

Yes I am surprised and I know that a 100% security doesn't really exist but c'mon... we are talking about a big service provider and it should not be easy to trick them (in my honest opinion) but everything is possible. The real problem is always the people, you can build the security that you want but you are fuc**ed if an employee will reset the pwd http://techforum.it/styles/default/xenforo/smilies/asd.gif.

Well Seems like It dosen't matter how big the service provider is anymore .
I mean look how big Amazon and famous it is . and you can trick them in less them 60 seconds . "Oh empty box" => "GG , refunded" and people are doing it all the time .


Title: Re: About the recent server compromise
Post by: Welsh on May 25, 2015, 08:31:09 PM
Beside our emails and passwords of course ... how bad it could be when the hackers have this "Last-used IP address and registration IP address" , im not an expert or anything but don't the IP change each time we reboot the modem ? :o Probably not the IP range but well

If having a IP address was that big of an issue, nobody would be safe. Just imagine the amount of websites you've connected to over the years. If you have open ports it can slightly more concerning, but it would likely require a number of things to be truley concerened. For example, vunerable software. Keep up to date with the latest patches is normally advised. If the hacker was interested in using the IP to exploit, it would more than likely be on highly ranked members with a large presensce within the Bitcoin community.

An issue some users may find, is that the hacker may have your IP address, which is a place to start exploiting. Your hash of your password. So if he/she does crack it then they know of one possible password you might use or varations of it. Or have a general idea of the passwords you use. They may also have a secret question and answer. But, I always recommend not using them, or if you must make it completely random.

Of course, if you are concerned. Then you should get started in cranking up your security. A lot of users will be doing this, just to keep it fresh.


Title: Re: About the recent server compromise
Post by: opieum2 on May 25, 2015, 08:36:58 PM
Theymos,

Check your PMs. I sent you some info on something that might get the ball rolling. That said there are obvious suspects which info I already provided to CCN. Some press coverage might get the right wheels greased to get an actual investigation going.


Title: Re: About the recent server compromise
Post by: Lauda on May 25, 2015, 08:43:10 PM
I am not sure why anyone would consider not using a VPN. They are really not very expensive to use and they provide a lot of added privacy.
If you believe that the majority of the users here use a VPN you are wrong.

For most people it doesn't matter if their IP address is now in the hands of the hacker, they will most likely target those with the highest ranks and based on how important that person is in the community.
Then I should have posted less I guess. Although a high post count is quite useless. I'm going to assume that the most likely targets would be people on the default trust list and people with a lot of trust (100+).

Have others received an email from the forum? I took a quick peek. Just want to verify if isn't something fishy.


Title: Re: About the recent server compromise
Post by: dogie on May 25, 2015, 09:12:55 PM
What's the limit for passwords? I tried using an unreasonably large string as my password and didn't receive any error messages (despite the load time after I press the login button being huge). Were the last characters of the string cut off for it to fit a certain limit?

No, the last characters are not cut off, at least not at any "reasonable" password length.  My password here is over 60 characters, and it still cares about whether the last character is entered. 

I used a 2024 character string though. Not the most reasonable password length eh? I was pretty surprised to see that there wasn't any warning or error message and that's why I came here to ask if there's any limit.

Aaaaaand now we know the reason why the server lags every now and then, you're signing in :D For the sake of the servers might want to set it to a reasonable 50 or so, which has the same strength of 2048 = not worth bruting = just as likely to be social'ed or reset.


Thanks theymos, I have changed my password yesterday and also today... and I hope to be 'safe' (a big word) now ;).   XAU for his real identity, it is a lot of money.... and I do not think he is stupid (he made a soc. engir. attack... only a few people are able to do it).
PS: however good luck with the search.

From what I saw it wasn't a new virtual identity that was used in the attack.



Title: Re: About the recent server compromise
Post by: dogie on May 25, 2015, 09:16:18 PM
Theymos,

Check your PMs. I sent you some info on something that might get the ball rolling. That said there are obvious suspects which info I already provided to CCN. Some press coverage might get the right wheels greased to get an actual investigation going.


I don't think a witchhunt + grease is a good combination, it just ends up in a "everyone is Satoshi" shitstorm that gets innocent people caught up. Those that aren't yet aware of the hacking yet probably don't have the expertise to work it out, so let those that do get on with it.


Title: Re: About the recent server compromise
Post by: Gervais on May 25, 2015, 09:17:33 PM
I am not sure why anyone would consider not using a VPN. They are really not very expensive to use and they provide a lot of added privacy.
If you believe that the majority of the users here use a VPN you are wrong.

I don't think he stated or insinuated that, just that people should consider using them.

Have others received an email from the forum? I took a quick peek. Just want to verify if isn't something fishy.

Yes, they were sent out by theymos en masse, though that doesn't mean you might not have recieved a phishing mail. I'm sure the hacker will try something with our emails.


Title: Re: About the recent server compromise
Post by: monbux on May 25, 2015, 09:18:10 PM
If our account still gets compromised, are you still able to revert permissions back with a PGP btc address to confirm user?

Yes. I also have a database snapshot from a little before the attack which I can use to verify people by email if necessary.
I'm sorry, but has theymos actually confirmed his forum identity after the attack yet?  And also, is it just me or is the forum currently loading slower than normal?


Title: Re: About the recent server compromise
Post by: alani123 on May 25, 2015, 09:20:15 PM
If our account still gets compromised, are you still able to revert permissions back with a PGP btc address to confirm user?

Yes. I also have a database snapshot from a little before the attack which I can use to verify people by email if necessary.
I'm sorry, but has theymos actually confirmed his forum identity after the attack yet?  And also, is it just me or is the forum currently loading slower than normal?

It's also loading slower for me, although I'm confident that this will improve throughout the day.


Title: Re: About the recent server compromise
Post by: Lauda on May 25, 2015, 09:28:06 PM
I don't think he stated or insinuated that, just that people should consider using them.

Have others received an email from the forum? I took a quick peek. Just want to verify if isn't something fishy.

Yes, they were sent out by theymos en masse, though that doesn't mean you might not have recieved a phishing mail. I'm sure the hacker will try something with our emails.
Well yes, I do agree on that. People should consider using one and using Protonmail (or a similar service) with Bitcointalk. Using that email only for Bitcointalk is also recommended.
I'm pretty sure that individuals will receive emails in the future; whoever uses the same email for other services too will receive a taste of social engineering.

I recall theymos saying that deleted PMs and posts are kept in the db? This is a concern (especially PMs) in situations like these. Hopefully PMs have not been compromised.


Title: Re: About the recent server compromise
Post by: fronti on May 25, 2015, 09:32:15 PM

After he got KVM access, the attacker convinced the ISP NFOrce that he was me (using his KVM access as part of his evidence) and said that he had locked himself out of the server. So NFOrce reset the server's root password for him, giving him complete access to the server and bypassing most of our carefully-designed security measures. I originally assumed that the attacker gained access entirely via social engineering, but later investigation showed that this was probably only part of the overall attack. As far as I know, NFOrce's overall security practices are no worse than average.


To reduce downtime and avoid temporarily-broken features, I was originally going to stay in NFOrce's data center. However, some things made me suspicious and I moved everything elsewhere. That's where the extra day+ of downtime came from after a short period of uptime. No additional data was leaked.


please do so!


Title: Re: About the recent server compromise
Post by: hilariousandco on May 25, 2015, 09:44:17 PM
If our account still gets compromised, are you still able to revert permissions back with a PGP btc address to confirm user?

Yes. I also have a database snapshot from a little before the attack which I can use to verify people by email if necessary.
I'm sorry, but has theymos actually confirmed his forum identity after the attack yet?  And also, is it just me or is the forum currently loading slower than normal?

Was running ok earlier but it's got a bit sluggish now, but that's to be expected as everyone tries logging on and resetting their passwords etc. Wouldn't surprise me if the forum will get ddosed as well.


Title: Re: About the recent server compromise
Post by: Mt.Gox Support on May 25, 2015, 09:47:25 PM
If our account still gets compromised, are you still able to revert permissions back with a PGP btc address to confirm user?

Yes. I also have a database snapshot from a little before the attack which I can use to verify people by email if necessary.
I'm sorry, but has theymos actually confirmed his forum identity after the attack yet?  And also, is it just me or is the forum currently loading slower than normal?

Was running ok earlier but it's got a bit sluggish now, but that's to be expected as everyone tries logging on and resetting their passwords etc. Wouldn't surprise me if the forum will get ddosed as well.

ddosbtc is fucking around with his annoying booter.


Title: Re: About the recent server compromise
Post by: cinnamon_carter on May 25, 2015, 10:12:43 PM
Did he confirm his identity ??

check the pgp signature in the e mail you would have got.

that confirms it

----------

Thanks for these details.

Also the people running this board CANNOT control if someone social eng. the employee's working or the isp.
This hack is not on them.

Furthermore I would suggest to everyone to do what i do regarding forums or anything else you 'sign up for' ....

Always use different e mail addresses and long difficult passwords, (also login names if possible)

If the information in the op is correct my password is good for several million years at present technology although I did change it as recommended.

Another item to remember.  If you use the e mail for this forum for other 'accounts' , for example twitter, or a coin exchange.....  remember for many places your e mail address is as good as your log in name.....

Therefore it may make it MUCH easier for someone to attack you someplace else unless you use only e mail addresses for one place. 

Anyone who uses the same password for more than one thing in life is just a sitting duck in cyberspace waiting to be taken out.

Personally what I am most curious about is why someone would go to such trouble to hack this forum ?

As most here are going to be way above average in security habits the chance of getting a password to something else is almost nil (and they were not stored in plaintext although I guess the attacker may have hoped they would be) . 

Was it an enemy of bitcoin ??

Was it a teenager hoping to be a famous hacker ?? (doubtful no one claimed respnsibility or  posted information to pastebin proving they pulled this off)

Was it some curious person wondering if they could figure out who Satoshi is ??

Was it a wealthy jealous spouse that paid a private investigator a lot of money to 'sniff out' all their spouses online activity ?

Was it a team of scammers hoping to steal bitcoin ??

I wonder....


When hacks take place they remind everyone how important it is to practice good secure methods on everything.  I guess now we wait and watch........ see what happens next.

   


Title: Re: About the recent server compromise
Post by: kolloh on May 25, 2015, 10:29:32 PM
Thanks for the info and hope you are able to figure out exactly how it happened.


Title: Re: About the recent server compromise
Post by: Gervais on May 25, 2015, 10:30:46 PM
Personally what I am most curious about is why someone would go to such trouble to hack this forum ?

As most here are going to be way above average in security habits the chance of getting a password to something else is almost nil (and they were not stored in plaintext although I guess the attacker may have hoped they would be) . 

Was it an enemy of bitcoin ??

   

You'd be surprised at how many people will reuse emails and passwords. I'm sure many do the same with their blockchain.info accounts too. Regardless of that, the infodump of all this forum's users emails would be very valuable to advertisers or scammers/spammers but maybe whoever hacked it did it just because he could. Some people just like finding security holes though I'm sure the person will try get some money out of the info he has.


Title: Re: About the recent server compromise
Post by: LFC_Bitcoin on May 25, 2015, 10:40:58 PM
If it happens again I'm going to stop posting on here & find somewhere else.
It's ridiculous that with 1.5 million USD donated they can't stop attacks like this happening.
Imagine if people had wallet back ups in their emails, bank details etc.
I think it's disgraceful.


Title: Re: About the recent server compromise
Post by: Gervais on May 25, 2015, 10:50:37 PM
If it happens again I'm going to stop posting on here & find somewhere else.
It's ridiculous that with 1.5 million USD donated they can't stop attacks like this happening.
Imagine if people had wallet back ups in their emails, bank details etc.
I think it's disgraceful.


It wasn't the forum's fault but the hosting. The new forum is being made now but that wouldn't have stopped this either and its being tested to make sure there are no holes or ways to exploit it. And people shouldn't keep their bank details or back ups of their wallets in their emails especially if they can't keep it secure.


Title: Re: About the recent server compromise
Post by: LFC_Bitcoin on May 25, 2015, 10:58:31 PM
If it happens again I'm going to stop posting on here & find somewhere else.
It's ridiculous that with 1.5 million USD donated they can't stop attacks like this happening.
Imagine if people had wallet back ups in their emails, bank details etc.
I think it's disgraceful.


It wasn't the forum's fault but the hosting. The new forum is being made now but that wouldn't have stopped this either and its being tested to make sure there are no holes or ways to exploit it. And people shouldn't keep their bank details or back ups of their wallets in their emails especially if they can't keep it secure.

Hopefully nobody has been badly effected by all of this.
Hopefully the culprit was just somebody that thought it'd be funny to make the site get taken down, a troll or something.
Wouldn't be nice if it was somebody who wanted to try & do it for monetary reasons.


Title: Re: About the recent server compromise
Post by: Gervais on May 25, 2015, 11:13:27 PM
Well it looks like people have already been badly effected by their info being leaked and I'm sure it will become publicly available at some point. It looks like several accounts have already been hacked and over the next few days I'm sure we'll see people complaining about having other accounts hacked or bitcoin balances cleaned out and so on.


Title: Re: About the recent server compromise
Post by: nomad13666 on May 25, 2015, 11:30:56 PM
All good here. Changed password just in case. Don't use secret question.


Title: Re: About the recent server compromise
Post by: Lauda on May 26, 2015, 05:11:41 AM
If it happens again I'm going to stop posting on here & find somewhere else.
It's ridiculous that with 1.5 million USD donated they can't stop attacks like this happening.
Imagine if people had wallet back ups in their emails, bank details etc.
I think it's disgraceful.

Actually no, you're the one being ridiculous. The money is being used to make a new forum, not actively prevent this one from being breached.
You don't even realize how lucky we are that theymos is the man behind the forum. Most of the time when these hacks happen it usually passes some time before detection.
You can blame anyone here. 1.5 million USD is nothing. If you take a look at the recent hacks, millions of people have been completely exposed.
Remember the Sony hack (a multi-million company)? or this:
http://www.usatoday.com/story/tech/2015/02/15/hackers-steal-billion-in-banking-breach/23464913/

Everyone was advised to use VPNs or at least PGP when sharing valuable information.


Title: Re: About the recent server compromise
Post by: AGD on May 26, 2015, 06:07:42 AM
It wasn't the forum's fault but the hosting.

Theymos claims it was the hosting. That's what you meant to say.
He openly states, in this very thread, that before any of the alleged social engineering took place,
"... The attacker was able to acquire KVM access credentials for the server. The investigation into how this was possible is still ongoing, so I don't know everything ..."

Not sure why everyone is acting like lax DC security is the issue,

The hoster denied beeing attacked with SE. It is still not clear how attacker gained access and why.
 
Possible, that the goal was to extract only a few certain PMs. This attack could be part of another, bigger attack. This also looks so determined to me, that I exclude email spammers, Satoshi seekers and random script kiddies.


Title: Re: About the recent server compromise
Post by: RFDZ on May 26, 2015, 06:31:50 AM
So when is the next compromise?  ;D

Just kidding. Need to know what happened though.


Title: Re: About the recent server compromise
Post by: mishax1 on May 26, 2015, 08:30:29 AM
The NSA hacked the forum to link users' information (nicknames, emails, IP's, passwords) with illegal activity made elsewhere..  ::)


Title: Re: About the recent server compromise
Post by: nor9865 on May 26, 2015, 08:35:35 AM
have a strong feeling they inserted a backdoor somewhere or a keylogger.

something that would keep them getting access to the forum and retrieve data


Title: Re: About the recent server compromise
Post by: Gervais on May 26, 2015, 08:53:45 AM
The NSA hacked the forum to link users' information (nicknames, emails, IP's, passwords) with illegal activity made elsewhere..  ::)

Why would they need to hack the forum when the NSA likely has access to all this info already?

have a strong feeling they inserted a backdoor somewhere or a keylogger.

something that would keep them getting access to the forum and retrieve data

I'm sure theymos checked for this kind of stuff or would have noticed if this had of happened. Probably why the forum was down for so long.


Title: Re: About the recent server compromise
Post by: favdesu on May 26, 2015, 09:14:22 AM
have a strong feeling they inserted a backdoor somewhere or a keylogger.

something that would keep them getting access to the forum and retrieve data

do you even know how a keylogger works?

anyways, host was compromised due to social engineering, so theymos did nothing wrong. In fact, the amateurs at NForce gave the attacker access (good job!)


Title: Re: About the recent server compromise
Post by: Buttknuckle on May 26, 2015, 09:28:52 AM
Geeze, well thanks Theymos for being awesome, if not discovered so quickly this could have been much worse.  After seeing that chart, time to go change a few passwords (eek!)


Title: Re: About the recent server compromise
Post by: (oYo) on May 26, 2015, 09:57:53 AM
The site has become incredibly slow since the compromise and I'm getting a lot of "502 Bad Gateway" notifications.


Title: Re: About the recent server compromise
Post by: hedgy73 on May 26, 2015, 10:03:00 AM
The site has become incredibly slow since the compromise and I'm getting a lot of "502 Bad Gateway" notifications.

Same here :(.


Title: Re: About the recent server compromise
Post by: Zeroxal on May 26, 2015, 01:53:38 PM
The site has become incredibly slow since the compromise and I'm getting a lot of "502 Bad Gateway" notifications.
Not actually see errors here. And the site works fine and fluent, however sometimes when I do actions(PM,Posts) it laggs so much that it usually takes about 30 seconds to post something


Title: Re: About the recent server compromise
Post by: hilariousetc on May 26, 2015, 02:27:23 PM
The site has become incredibly slow since the compromise and I'm getting a lot of "502 Bad Gateway" notifications.
Not actually see errors here. And the site works fine and fluent, however sometimes when I do actions(PM,Posts) it laggs so much that it usually takes about 30 seconds to post something

The forum was very laggy earlier on but it's been working ok since. I'm sure it'll be up and down every now and again until the forum gets back on its feet.


Title: Re: About the recent server compromise
Post by: ACCTseller on May 26, 2015, 02:36:10 PM
The site has become incredibly slow since the compromise and I'm getting a lot of "502 Bad Gateway" notifications.
Not actually see errors here. And the site works fine and fluent, however sometimes when I do actions(PM,Posts) it laggs so much that it usually takes about 30 seconds to post something

The forum was very laggy earlier on but it's been working ok since. I'm sure it'll be up and down every now and again until the forum gets back on its feet.
I think the period when it was laggy/slow was a peak usage time for the forum. I would be interested to see if the forum experiences similar performance issues around the same time tonight.


Title: Re: About the recent server compromise
Post by: Josef27 on May 26, 2015, 03:03:31 PM
Just back after a long break and saw this, that explain why I can't access the forum recently.

Also I suddenly receive spam email from somewhere (mostly german or something), anyone got the same problem?


Title: Re: About the recent server compromise
Post by: thebitcoinquiz.com on May 26, 2015, 03:10:41 PM
Just back after a long break and saw this, that explain why I can't access the forum recently.

Also I suddenly receive spam email from somewhere (mostly german or something), anyone got the same problem?
Was the email related to the forum or was it just someone trying to sell you some medicines or electronics?
I just hope the email was not for phishing.


Title: Re: About the recent server compromise
Post by: Josef27 on May 26, 2015, 03:26:35 PM
Just back after a long break and saw this, that explain why I can't access the forum recently.

Also I suddenly receive spam email from somewhere (mostly german or something), anyone got the same problem?
Was the email related to the forum or was it just someone trying to sell you some medicines or electronics?
I just hope the email was not for phishing.
Not related to forum I think atm because I can't understand the language, also I already deleted the other but I saw one of them like referral or something and another one linked with url shortener (I dont want to click the link) also like one of them impersonating a bitcoin services or something related.


Title: Re: About the recent server compromise
Post by: Keyser Soze on May 26, 2015, 05:07:58 PM
Not sure if I missed it somewhere, but if the "secret question" field is blank, does this mean it is not set? I don't believe I ever set one in the past and want to make sure that is still the case.


Title: Re: About the recent server compromise
Post by: alch1mista on May 26, 2015, 05:11:54 PM
Not sure if I missed it somewhere, but if the "secret question" field is blank, does this mean it is not set? I don't believe I ever set one in the past and want to make sure that is still the case.

Same question here, please let us know.


Title: Re: About the recent server compromise
Post by: BadBear on May 26, 2015, 05:15:10 PM
Yes, empty means there isn't one. Double check and make sure it's actually empty, and that there aren't any white spaces (cursor there, backspace and then delete). 


Title: Re: About the recent server compromise
Post by: redsn0w on May 26, 2015, 05:17:17 PM
If our account still gets compromised, are you still able to revert permissions back with a PGP btc address to confirm user?

Yes. I also have a database snapshot from a little before the attack which I can use to verify people by email if necessary.
I'm sorry, but has theymos actually confirmed his forum identity after the attack yet?  And also, is it just me or is the forum currently loading slower than normal?

Was running ok earlier but it's got a bit sluggish now, but that's to be expected as everyone tries logging on and resetting their passwords etc. Wouldn't surprise me if the forum will get ddosed as well.

ddosbtc is fucking around with his annoying booter.

Another hacked account  ;D, WTF ... welcome back Mt.Gox support !


Title: Re: About the recent server compromise
Post by: MakingMoneyHoney on May 26, 2015, 05:24:59 PM
It wasn't the forum's fault but the hosting.

Theymos claims it was the hosting. That's what you meant to say.
He openly states, in this very thread, that before any of the alleged social engineering took place,
"... The attacker was able to acquire KVM access credentials for the server. The investigation into how this was possible is still ongoing, so I don't know everything ..."

Not sure why everyone is acting like lax DC security is the issue,

The hoster denied beeing attacked with SE. It is still not clear how attacker gained access and why.

Where did you see this? People here are still under the impression it was Social Engineering....


Title: Re: About the recent server compromise
Post by: AGD on May 26, 2015, 08:04:44 PM
It wasn't the forum's fault but the hosting.

Theymos claims it was the hosting. That's what you meant to say.
He openly states, in this very thread, that before any of the alleged social engineering took place,
"... The attacker was able to acquire KVM access credentials for the server. The investigation into how this was possible is still ongoing, so I don't know everything ..."

Not sure why everyone is acting like lax DC security is the issue,

The hoster denied beeing attacked with SE. It is still not clear how attacker gained access and why.

Where did you see this? People here are still under the impression it was Social Engineering....

I don't remember where it was. It was one of the crypto news sites. They wrote, they have called NFOrce about the incident and they denied beeing attacked with SE.


Title: Re: About the recent server compromise
Post by: favdesu on May 26, 2015, 08:35:43 PM
It wasn't the forum's fault but the hosting.

Theymos claims it was the hosting. That's what you meant to say.
He openly states, in this very thread, that before any of the alleged social engineering took place,
"... The attacker was able to acquire KVM access credentials for the server. The investigation into how this was possible is still ongoing, so I don't know everything ..."

Not sure why everyone is acting like lax DC security is the issue,

The hoster denied beeing attacked with SE. It is still not clear how attacker gained access and why.

Where did you see this? People here are still under the impression it was Social Engineering....

I don't remember where it was. It was one of the crypto news sites. They wrote, they have called NFOrce about the incident and they denied beeing attacked with SE.

of course they would deny it. Social engineering is the worst PR for them, no one would trust them anymore


Title: Re: About the recent server compromise
Post by: redsn0w on May 26, 2015, 08:40:11 PM
It wasn't the forum's fault but the hosting.

Theymos claims it was the hosting. That's what you meant to say.
He openly states, in this very thread, that before any of the alleged social engineering took place,
"... The attacker was able to acquire KVM access credentials for the server. The investigation into how this was possible is still ongoing, so I don't know everything ..."

Not sure why everyone is acting like lax DC security is the issue,

The hoster denied beeing attacked with SE. It is still not clear how attacker gained access and why.

Where did you see this? People here are still under the impression it was Social Engineering....

I don't remember where it was. It was one of the crypto news sites. They wrote, they have called NFOrce about the incident and they denied beeing attacked with SE.

of course they would deny it. Social engineering is the worst PR for them, no one would trust them anymore

Exactly, I have started to think ....that with a simple thing you can ruin all the security that you have created. A soc. eng. attack is a simple concept but it is not simple to do, it brought me back to my mind the story of 'kevin mitnick".


Title: Re: About the recent server compromise
Post by: teddy5145 on May 26, 2015, 08:51:32 PM
Thank you for keeping this site safe  :)
Maybe you could invest in some kind better security in the future? just in case something like this happening again
and im still trying to figure out what's the motive of the attacker to attack this site  :-\

If they get an email/password combo figured out, they could have passed them self off as a well respected member and done deals where they get money and run. Or, just use the email/password to log into a bank account, or exchange account and withdraw the money. One of the main things is to use a unique password for each site. Lastpass.com is good for that, if anyone hasn't heard of them.
Luckily my btctalk password is different from my bank and paypal account.
When creating my password i used text randomizer and then save it onto my notepad and backed it up on gdrive
Very safe i must say  :D


Title: Re: About the recent server compromise
Post by: Scamalert on May 26, 2015, 09:23:58 PM
Passwords are hashed with 7500 rounds of sha256crypt. This is pretty good, but certainly not beyond attack. Note that even though SHA-256 is used here, sha256crypt is different enough from Bitcoin's SHA-256d PoW algorithm that Bitcoin mining ASICs almost certainly cannot be modified to crack forum passwords.

How much does the password need to be changed, whould it be enough to change a letter or two.
Or would it be better to make a brand new long and complicated password.
Reason I ask is that it take some time to memories a long complicated password,
if only added or removing something will the learning time for the new password decrease.


Title: Re: About the recent server compromise
Post by: favdesu on May 26, 2015, 09:27:56 PM
Passwords are hashed with 7500 rounds of sha256crypt. This is pretty good, but certainly not beyond attack. Note that even though SHA-256 is used here, sha256crypt is different enough from Bitcoin's SHA-256d PoW algorithm that Bitcoin mining ASICs almost certainly cannot be modified to crack forum passwords.

How much does the password need to be changed, whould it be enough to change a letter or two.
Or would it be better to make a brand new long and complicated password.
Reason I ask is that it take some time to memories a long complicated password,
if only added or removing something will the learning time for the new password decrease.

no, make a fresh, and new password.

if you have issues remembering all passwords - check out KeePass 2 - it's a open source password vault. you only need one master password


Title: Re: About the recent server compromise
Post by: Scamalert on May 26, 2015, 09:38:53 PM
Passwords are hashed with 7500 rounds of sha256crypt. This is pretty good, but certainly not beyond attack. Note that even though SHA-256 is used here, sha256crypt is different enough from Bitcoin's SHA-256d PoW algorithm that Bitcoin mining ASICs almost certainly cannot be modified to crack forum passwords.

How much does the password need to be changed, whould it be enough to change a letter or two.
Or would it be better to make a brand new long and complicated password.
Reason I ask is that it take some time to memories a long complicated password,
if only added or removing something will the learning time for the new password decrease.

no, make a fresh, and new password.

if you have issues remembering all passwords - check out KeePass 2 - it's a open source password vault. you only need one master password

Yes, you are proberly right....... I need a brand new one, adding 8 letters is not good enough.
I look at that KeePass 2, it looks pretty good, just not sure I can trust it.....
But thank you anyways :)


Title: Re: About the recent server compromise
Post by: readysalted89 on May 26, 2015, 10:31:04 PM
Passwords are hashed with 7500 rounds of sha256crypt. This is pretty good, but certainly not beyond attack. Note that even though SHA-256 is used here, sha256crypt is different enough from Bitcoin's SHA-256d PoW algorithm that Bitcoin mining ASICs almost certainly cannot be modified to crack forum passwords.

How much does the password need to be changed, whould it be enough to change a letter or two.
Or would it be better to make a brand new long and complicated password.
Reason I ask is that it take some time to memories a long complicated password,
if only added or removing something will the learning time for the new password decrease.

no, make a fresh, and new password.

if you have issues remembering all passwords - check out KeePass 2 - it's a open source password vault. you only need one master password

Are the passwords it generates by using mouse movements for additional entropy completely random? Does it only generate pseudo random passwords without using mouse movements or anything else to collect additional entropy?


Title: Re: About the recent server compromise
Post by: Gisado on May 26, 2015, 11:21:59 PM
Compromise notification email said reset question was less brute-force resistant, so I wanted to remove it. Is blanking QnA form (and save) enough to disable it?


Title: Re: About the recent server compromise
Post by: theymos_away on May 26, 2015, 11:29:54 PM
Compromise notification email said reset question was less brute-force resistant, so I wanted to remove it. Is blanking QnA form (and save) enough to disable it?

Yes, make the secret question field empty.


Title: Re: About the recent server compromise
Post by: Welsh on May 26, 2015, 11:35:43 PM
Compromise notification email said reset question was less brute-force resistant, so I wanted to remove it. Is blanking QnA form (and save) enough to disable it?

You can always test it yourself by going to the "forgotten password" and selecting "Ask me my security question". It will tell you if it's not enabled on your account. That's if you want to double check.


Title: Re: About the recent server compromise
Post by: shavers on May 27, 2015, 12:06:08 AM
Good job on getting this up again lads! Hope next time you'll be ready and fully armed! ;) This downtime looked like an eternity, lot of us missed you.


Title: Re: About the recent server compromise
Post by: Superhitech on May 27, 2015, 03:20:27 AM
Thanks for the explanation theymos.  

On May 22 at 00:56 UTC, an attacker gained root access to the forum's server. He then proceeded to try to acquire a dump of the forum's database before I noticed this at around 1:08 and shut down the server. In the intervening time, it seems that he was able to collect some or all of the "members" table. You should assume that the following information about your account was leaked:

Does this mean that only people with the member rank were effected, or all forum members? Changing my password anyways, just curious.

Also, I found this interesting article: https://www.cryptocoinsnews.com/bitcoin-mining-figure-joshua-zipkin-responsible-bitcointalk-hack/

Opinions?


Title: Re: About the recent server compromise
Post by: notlist3d on May 27, 2015, 03:55:24 AM
Thanks for the explanation theymos.  

On May 22 at 00:56 UTC, an attacker gained root access to the forum's server. He then proceeded to try to acquire a dump of the forum's database before I noticed this at around 1:08 and shut down the server. In the intervening time, it seems that he was able to collect some or all of the "members" table. You should assume that the following information about your account was leaked:

Does this mean that only people with the member rank were effected, or all forum members? Changing my password anyways, just curious.

Also, I found this interesting article: https://www.cryptocoinsnews.com/bitcoin-mining-figure-joshua-zipkin-responsible-bitcointalk-hack/

Opinions?

I think the comments are pretty dated.  I do know AMT has no love here so I could see them having a reason.  But I don't know how much of a threat the owner is. 

I do wonder do we know besides password was other information also salted?  Or are we talking plain text?


Title: Re: About the recent server compromise
Post by: freedomno1 on May 27, 2015, 04:23:35 AM
Off to change the password
It's good to know that a Bitcoin miner can't be used to break encryption
Thanks for the hard work theymos


Title: Re: About the recent server compromise
Post by: hedgy73 on May 27, 2015, 06:12:45 AM
Thanks for your hard work getting the forum back up and running Theymos, it must have been a real headache.

Lets hope the reward your offering helps catch the lowlife scumbags.


Title: Re: About the recent server compromise
Post by: Lauda on May 27, 2015, 07:02:52 AM
Yes, you are proberly right....... I need a brand new one, adding 8 letters is not good enough.
I look at that KeePass 2, it looks pretty good, just not sure I can trust it.....
But thank you anyways :)
There's no reason no to trust it. Since it is open source, and if coders have accepted it it should be fine. Also there is always the old school method of writing it down on a piece of paper.

Off to change the password
It's good to know that a Bitcoin miner can't be used to break encryption
Thanks for the hard work theymos
Although the majority of the passwords will still get broken.


Title: Re: About the recent server compromise
Post by: itod on May 27, 2015, 08:31:53 AM
Although the majority of the passwords will still get broken.

I'm not so sure about this. It's hard to estimate how long passwords people used, but average 11-length alphanumeric password needs 3 months (estimated) to be cracked, and 12-length 3 years. Longer passwords probably won't get cracked. If majority of people here used shorter passwords then, yes, majority will get broken, but I think that is not the case, majority of people here new better then to use short passwords.


Title: Re: About the recent server compromise
Post by: thebitcoinquiz.com on May 27, 2015, 10:21:51 AM
Why is this news, "News: Change your password!" only showed on the index page?
I believe that right now this news is the like the most important thing for the forum and should be displayed on all the threads.


Title: Re: About the recent server compromise
Post by: BTCtalkScammerDetective on May 27, 2015, 10:25:44 AM
Why is this news, "News: Change your password!" only showed on the index page?
I believe that right now this news is the like the most important thing for the forum and should be displayed on all the threads.

At least have it in bold so it's easier to see.


Title: Re: About the recent server compromise
Post by: KarmaShark on May 27, 2015, 11:10:21 AM
Happy to see that all is good now! I think it was 3rd hack attempt in last 2 months.


Title: Re: About the recent server compromise
Post by: chrisvl on May 27, 2015, 11:34:02 AM
404 security not found /\ Theymos protect the bitcointalk community there are to much ways


Title: Re: About the recent server compromise
Post by: rishabh6115 on May 28, 2015, 05:20:11 AM
Do we have to change our passwords or it is fine to keep before one. Please answer fast.


Title: Re: About the recent server compromise
Post by: MakingMoneyHoney on May 28, 2015, 05:22:30 AM
Do we have to change our passwords or it is fine to keep before one. Please answer fast.

You should change it.


Title: Re: About the recent server compromise
Post by: DiamondCardz on May 28, 2015, 05:25:15 AM
Ooh. That's a lot of kiloyears to break my password.

Thanks for the warning, I updated my password after the hack just to be safe and also to make it a little bit more secure compared to the password that I previously had on my account.

rishabh6115: Depends. If it's extremely secure you might not need to take action, if it's less secure you should, but in all fairness you probably should either way.


Title: Re: About the recent server compromise
Post by: mmortal03 on May 28, 2015, 08:28:55 PM
So, since the forums have been back up, Topic Notifications of new replies have not been getting e-mailed out.


Title: Re: About the recent server compromise
Post by: theymos on May 28, 2015, 08:32:54 PM
So, since the forums have been back up, Topic Notifications of new replies have not been getting e-mailed out.

They are getting mailed out, your mail provider is just rejecting them. Maybe I will get a new IP address in the future to stop this from happening, but IMO this is a problem on hotmail's end.

Code:
May 28 17:42:22 B184CA91EB5: to=<...>,
relay=mx1.hotmail.com[65.55.37.72]:25, delay=0.55,
delays=0.16/0/0.28/0.1, dsn=5.0.0, status=bounced (host
mx1.hotmail.com[65.55.37.72] said: 550 OU-002 (COL004-MC1F36)
Unfortunately, messages from 198.251.81.170 weren't sent. Please
contact your Internet service provider since part of their network
is on our block list. You can also refer your provider to
http://mail.live.com/mail/troubleshooting.aspx#errors. (in reply to
MAIL FROM command))


Title: Re: About the recent server compromise
Post by: chrisvl on May 28, 2015, 08:35:29 PM
So, since the forums have been back up, Topic Notifications of new replies have not been getting e-mailed out.

They are getting mailed out, your mail provider is just rejecting them. Maybe I will get a new IP address in the future to stop this from happening, but IMO this is a problem on hotmail's end.

Code:
May 28 17:42:22 B184CA91EB5: to=<...>,
relay=mx1.hotmail.com[65.55.37.72]:25, delay=0.55,
delays=0.16/0/0.28/0.1, dsn=5.0.0, status=bounced (host
mx1.hotmail.com[65.55.37.72] said: 550 OU-002 (COL004-MC1F36)
Unfortunately, messages from 198.251.81.170 weren't sent. Please
contact your Internet service provider since part of their network
is on our block list. You can also refer your provider to
http://mail.live.com/mail/troubleshooting.aspx#errors. (in reply to
MAIL FROM command))

why reject them ??


Title: Re: About the recent server compromise
Post by: Welsh on May 28, 2015, 08:36:51 PM
why reject them ??
Probably due to the fact that the site has sent out thousands of mails within a short period of time, due to the recent compromise.


Title: Re: About the recent server compromise
Post by: freedomno1 on May 28, 2015, 08:43:02 PM
why reject them ??
Probably due to the fact that the site has sent out thousands of mails within a short period of time, due to the recent compromise.

That would make sense it must have triggered some spam filter and ended up on hotmails block list
Guess it might fix itself sooner or later


Title: Re: About the recent server compromise
Post by: mmortal03 on May 28, 2015, 11:33:45 PM
So, since the forums have been back up, Topic Notifications of new replies have not been getting e-mailed out.

They are getting mailed out, your mail provider is just rejecting them. Maybe I will get a new IP address in the future to stop this from happening, but IMO this is a problem on hotmail's end.

Code:
May 28 17:42:22 B184CA91EB5: to=<...>,
relay=mx1.hotmail.com[65.55.37.72]:25, delay=0.55,
delays=0.16/0/0.28/0.1, dsn=5.0.0, status=bounced (host
mx1.hotmail.com[65.55.37.72] said: 550 OU-002 (COL004-MC1F36)
Unfortunately, messages from 198.251.81.170 weren't sent. Please
contact your Internet service provider since part of their network
is on our block list. You can also refer your provider to
http://mail.live.com/mail/troubleshooting.aspx#errors. (in reply to
MAIL FROM command))

Interesting. Besides this issue with Hotmail, I also have no ability to sign up on bugs.python.org or counterpartytalk.org because the confirmation e-mails are never received. The bugs.python.org e-mails have been blocked for *years*, according to similar complaints I've found online. How obnoxious on Microsoft's part.


Title: Re: About the recent server compromise
Post by: diffused30 on May 29, 2015, 12:47:50 AM
How do I get hotmail to accept the mail from bitcointalk?


Title: Re: About the recent server compromise
Post by: Muhammed Zakir on May 29, 2015, 05:42:53 AM
How do I get hotmail to accept the mail from bitcointalk?

Whitelist Bitcointalk email addresses.


Title: Re: About the recent server compromise
Post by: sgk on May 29, 2015, 07:16:57 AM
How do I get hotmail to accept the mail from bitcointalk?

I am not using Hotmail, but are you receiving forum emails in 'Junk' folder or you're not receiving them at all?

If you're receiving them in Junk, it should be very easy to just mark them as 'Not Junk'.
If you're not receiving them altogether, you should find out if Hotmail allows 'white-listing' specific domains or email addresses, like MZ suggested above.


Title: Re: About the recent server compromise
Post by: bcearl on May 29, 2015, 08:35:38 AM
Why did you not even send a warning mail to all addresses? Thousands of casual forum users don't even know about this incident and their password hashes stolen.


Title: Re: About the recent server compromise
Post by: Borisz on May 29, 2015, 08:43:39 AM
Why did you not even send a warning mail to all addresses? Thousands of casual forum users don't even know about this incident and their password hashes stolen.
There was an email on the 24th of May, 2015.


Title: Re: About the recent server compromise
Post by: bcearl on May 29, 2015, 10:32:00 AM
There was an email on the 24th of May, 2015.

I certainly did not get it, and I asked a few people from whom nobody got it either.


Title: Re: About the recent server compromise
Post by: jmurjeff on May 29, 2015, 10:34:17 AM
How do I get hotmail to accept the mail from bitcointalk?

I am not using Hotmail, but are you receiving forum emails in 'Junk' folder or you're not receiving them at all?

If you're receiving them in Junk, it should be very easy to just mark them as 'Not Junk'.
If you're not receiving them altogether, you should find out if Hotmail allows 'white-listing' specific domains or email addresses, like MZ suggested above.

I don't need it anymore. I had to create a new account because  I could not recover my password and that is why I needed to know how to receive mail. But theymos helped me out by sending mail to my hotmail account. I have not received a single mail from this site. I think they blocked the bitcointalk.org domain. I am going to switch to gmail because I can receive mail from this site.


Title: Re: About the recent server compromise
Post by: hilariousandco on May 29, 2015, 10:51:46 AM
There was an email on the 24th of May, 2015.

I certainly did not get it, and I asked a few people from whom nobody got it either.

Some service providers block certain IPs the forum uses to send emails so that may be why.


Title: Re: About the recent server compromise
Post by: DiamondCardz on May 29, 2015, 10:54:36 AM
There was an email on the 24th of May, 2015.

I certainly did not get it, and I asked a few people from whom nobody got it either.

Some service providers block certain IPs the forum uses to send emails so that may be why.

Perhaps. I certainly got it (as someone who doesn't use hotmail as an email provider, not disclosing my email provider though) and there is a warning at the top of the forum telling you to change your passwords, so I don't see what else could or should be done to keep people "safe".


Title: Re: About the recent server compromise
Post by: Borisz on May 29, 2015, 11:27:00 AM
There was an email on the 24th of May, 2015.

I certainly did not get it, and I asked a few people from whom nobody got it either.

It came from the standard email address where I normally receive messages from, regarding new PMs and such. I suggest you either check if you receive emails at all from the forum (settings etc.) or change the email address. It's good to stay up-to-date in such situations.

Although, indeed there was a message in the forum header as well.


Title: Re: About the recent server compromise
Post by: sgk on May 29, 2015, 12:00:39 PM
There was an email on the 24th of May, 2015.

I certainly did not get it, and I asked a few people from whom nobody got it either.

It might be an issue with certain email providers, because most of the users received the email fine. I also received it with no problem.

Here's the full text of the email:

Code:
from:	noreply@bitcointalk.org
to: xxxxxxxxxxxxx
date: 25 May 2015 at 20:41
subject: Bitcoin Forum: Password change required
mailed-by: bitcointalk.org


-----BEGIN PGP SIGNED MESSAGE----
Hash: SHA256

You are receiving this message because your email address is associated
with an account on bitcointalk.org. I regret to have to inform you that
some information about your account was obtained by an attacker who
successfully compromised the bitcointalk.org server. The following
information about your account was likely leaked:
 - Email address
 - Password hash
 - Last-used IP address and registration IP address
 - Secret question and a basic (not brute-force-resistant) hash of your
 secret answer
 - Various settings

You should immediately change your forum password and delete or change
your secret question. To do this, log into the forum, click "profile",
and then go to "account related settings".

If you used the same password on bitcointalk.org as on other sites, then
you should also immediately change your password on those other sites.
Also, if you had a secret question set, then you should assume that the
attacker now knows the answer to your secret question.

Your password was salted and hashed using sha256crypt with 7500 rounds.
This will slow down anyone trying to recover your password, but it will
not completely prevent it unless your password was extremely strong.

While nothing can ever be ruled out in these sorts of situations, I do
not believe that the attacker was able to collect any forum personal
messages.

I apologize for the inconvenience and for any trouble that this may cause.
-----BEGIN PGP SIGNATURE-----

iF4EAREIAAYFAlVhiGIACgkQxlVWk9q1keeUmgEAhGi8pTghxISo1feeXkUMhW3a
uKxLeOOkTQR5Zh7aGKoBAMEvYsGEBGt3hzInIh+k43XJjGYywSiPAal1KI7Arfs0
=bvuI
-----END PGP SIGNATURE-----


Title: Re: About the recent server compromise
Post by: bcearl on May 29, 2015, 01:52:18 PM
Thanks for the info. I confirmed at least two people who did not receive any such e-mail. One is a Google Mail address (@gmail.com), the other one has a big German university's e-mail address. The mails are not in the spam folders either.

Just saying. Get a decent way to send them, theymos, and send all of them again. You cannot just set up a random server with a random IP address and send mails. It's not the 80's any more. Due to spam epidemic, major mail providers will reject those mails.


Title: Re: About the recent server compromise
Post by: itod on May 29, 2015, 10:06:51 PM
Just saying. Get a decent way to send them, theymos, and send all of them again. You cannot just set up a random server with a random IP address and send mails. It's not the 80's any more. Due to spam epidemic, major mail providers will reject those mails.

Wait, you are suggesting because few guys' spam filters blocked the circular mail theymos should spam us all with that mail again?!? That makes no sense. Have you ever, I mean ever, seen same circular mail re-sent to you just in case somebody may miss it? No serious entity does that, so should not Bitcointalk either.


Title: Re: About the recent server compromise
Post by: theymos on May 29, 2015, 10:20:51 PM
Just saying. Get a decent way to send them, theymos, and send all of them again. You cannot just set up a random server with a random IP address and send mails. It's not the 80's any more. Due to spam epidemic, major mail providers will reject those mails.

The mail certainly came from bitcointalk.org due to the forum's SPF policy, and users have been receiving legitimate mail from bitcointalk.org for years, so any mail provider that bounces forum mail is outright broken IMO. It's ridiculous that 500,000 users can receive consistent legitimate mail from the forum for years, but then when I want to send them all one mail some of the big providers freak out.


Title: Re: About the recent server compromise
Post by: Racey on May 29, 2015, 10:56:16 PM
I got the e-mail from here, I am using hotmail, but my mail is masked (https://www.abine.com/maskme/emails/) so its useless to anyone.
Any spam I can reject it back to the Abine website and never get mail from them again (https://www.abine.com/maskme/emails/)

I only changed my password for the forum as it makes sense to keep this, I use many masked mails.
You should give it a go its free, you do get an option to buy premium, it has more features.
I have have the free one...works good for me.

One of my newly created e-mail accounts was used to sign up for that Mine that cloud scam, I recived a few spam mailings, so I knew it came from them, or they sold it on to third parties.

These did admit to buying my mail, but removed his post some time later.

https://bitcointalk.org/index.php?topic=946801.msg10470176#msg10470176


Title: Re: About the recent server compromise
Post by: bcearl on May 30, 2015, 07:54:01 PM
Wait, you are suggesting because few guys' spam filters blocked the circular mail theymos should spam us all with that mail again?!? That makes no sense. Have you ever, I mean ever, seen same circular mail re-sent to you just in case somebody may miss it? No serious entity does that, so should not Bitcointalk either.

It is NOT in the spam filters.

Also: I am a member for 4 years, and I got several mails from bitcointalk in the past.


Title: Re: About the recent server compromise
Post by: svein on May 30, 2015, 09:00:32 PM
Second time I get the error after a post:

Quote
Database error
Please try again. If you come back to this error screen, report the error to an administrator.

But my posts got posted so I don't know if there is really an error or if the message itself is the error


Title: Re: About the recent server compromise
Post by: MakingMoneyHoney on May 30, 2015, 09:01:51 PM
Second time I get the error after a post:

Quote
Database error
Please try again. If you come back to this error screen, report the error to an administrator.

But my posts got posted so I don't know if there is really an error or if the message itself is the error

I also saw someone triple posting in a thread I posted in. When I posted, it didn't look like it worked. But I refreshed the page in another tab and was able to see my post went through.

Also, unread new replies, when I click them and read them, they're not showing up as read afterwards.


Title: Re: About the recent server compromise
Post by: Brewins on May 31, 2015, 12:48:21 AM
Everyone get a load of this?

https://www.reddit.com/r/Bitcoin/comments/37w9a0/bitcointalk_database_for_sell/

Seem legit?


someone is/has been spamming the goods section with that, but got banned pretty quickly.

For me is just scam. Any kid can make a large file that looks more or less like a database with lots of nonsense then put it for sale in the hope that some moron will buy it


Title: Re: About the recent server compromise
Post by: BlindMayorBitcorn on May 31, 2015, 12:50:32 AM
Everyone get a load of this?

https://www.reddit.com/r/Bitcoin/comments/37w9a0/bitcointalk_database_for_sell/

Seem legit?


someone is/has been spamming the goods section with that, but got banned pretty quickly.

For me is just scam. Any kid can make a large file that looks more or less like a database with lots of nonsense then put it for sale in the hope that some moron will buy it

Ah. Understood. ::)


Title: Re: About the recent server compromise
Post by: theymos on June 02, 2015, 05:34:40 AM
Search is enabled again.


Title: Re: About the recent server compromise
Post by: deepceleron on June 02, 2015, 06:30:14 AM
Code:
Estimated time (conservative) for an attacker to break randomly-constructed
bitcointalk.org passwords with current technology

s=second; m=minute; h=hour; d=day; y=year; ky=1000 years; My=1 million years

Password length  a-z  a-zA-Z  a-zA-Z0-9  <all standard>
              8    0      3s        12s              2m
              9    0      2m        13m              3h
             10   8s      2h        13h             13d
             11   3m      5d        34d              1y
             12   1h    261d         3y            260y
             13   1d     37y       366y            22ky
             14  43d   1938y       22ky             1My
             15   1y   100ky        1My           160My
-------------------------------------------------------
         1 word  0
        2 words  0
        3 words  0
        4 words  3m
        5 words  19d
        6 words  405y
        7 words  3My


Good luck to the password hashers with my 34 character random password. The security answer is similar strength garbage. Don't think I'll need to change it. The forum also has it's own non-reused email address, if any mail turns up there I know the source is the forum or a leak.

Once you are hosting-pwnd though, you have to audit EVERYTHING if you're not going to wipe and restore from backup pre-intrusion. Anything could have been done, such as redirects or php hacks to capture passwords or cookie sessions, or wholesale VM state dumps that still would allow compromise of existing accounts.


Title: Re: About the recent server compromise
Post by: mmortal03 on June 02, 2015, 01:05:52 PM
why reject them ??
Probably due to the fact that the site has sent out thousands of mails within a short period of time, due to the recent compromise.

That would make sense it must have triggered some spam filter and ended up on hotmails block list
Guess it might fix itself sooner or later

Yeah, I've just started to get e-mail notifications again in my Hotmail account.


Title: Re: About the recent server compromise
Post by: theymos on June 02, 2015, 06:05:59 PM
Automatic unproxybans are enabled again.


Title: Re: About the recent server compromise
Post by: opentoe on June 07, 2015, 06:35:17 AM
How many times is this place going to get hacked and beat up? Now on two years saying the forum SW will be updated from the thousands and thousands of dollars in donations. Are we all missing something? Jesus, even try discourse if you have to.


Title: Re: About the recent server compromise
Post by: Malin Keshar on June 07, 2015, 06:43:32 AM
How many times is this place going to get hacked and beat up? Now on two years saying the forum SW will be updated from the thousands and thousands of dollars in donations. Are we all missing something? Jesus, even try discourse if you have to.


This time was not forum's fault, but ISP's fault. At least is what theymos says.

And thheymos changed ISP, he said, so I guess the odds of another attack of same kind are lowered


Title: Re: About the recent server compromise
Post by: favdesu on June 07, 2015, 07:54:45 AM
How many times is this place going to get hacked and beat up? Now on two years saying the forum SW will be updated from the thousands and thousands of dollars in donations. Are we all missing something? Jesus, even try discourse if you have to.


This time was not forum's fault, but ISP's fault. At least is what theymos says.

And thheymos changed ISP, he said, so I guess the odds of another attack of same kind are lowered

not really. social engineering is omnipresent and can happen everywhere. hopefully the new ISP has some stricter quality management and certain processes to prevent it.


Title: Re: About the recent server compromise
Post by: Syke on June 08, 2015, 12:21:35 AM
So NFOrce reset the server's root password for him, giving him complete access to the server

Is this normal for ISPs to have the sort of access that allows them to reset any server root password??? That is insane!!!


Title: Re: About the recent server compromise
Post by: Lauda on June 08, 2015, 07:08:38 AM
So NFOrce reset the server's root password for him, giving him complete access to the server

Is this normal for ISPs to have the sort of access that allows them to reset any server root password??? That is insane!!!
Update 2:
It is normal. Stop quoting this post.

Update: You've just presented an example how this attack could have been avoided. This attack is just one (1) way of doing social engineering. It can't be prevented, because everything can be hacked.
Because of your nonsense, you are now put in the same group as BADecker. Have a nice day.


Title: Re: About the recent server compromise
Post by: AGD on June 08, 2015, 08:02:54 AM
So NFOrce reset the server's root password for him, giving him complete access to the server

Is this normal for ISPs to have the sort of access that allows them to reset any server root password??? That is insane!!!
No, it is not. What would happen if theymos actually forgot his password and they couldn't reset it?
You can't prevent social engineering, no matter what you do.

Usually ISPs have contact information, like phone number, home adress, passport scan etc which can easily be used to verify a person. When combined with PGP, whis should be almost 100% safe.


Title: Re: About the recent server compromise
Post by: favdesu on June 08, 2015, 08:18:55 AM
So NFOrce reset the server's root password for him, giving him complete access to the server

Is this normal for ISPs to have the sort of access that allows them to reset any server root password??? That is insane!!!
No, it is not. What would happen if theymos actually forgot his password and they couldn't reset it?
You can't prevent social engineering, no matter what you do.

Usually ISPs have contact information, like phone number, home adress, passport scan etc which can easily be used to verify a person. When combined with PGP, whis should be almost 100% safe.

and that's the point. social engineering depends on human error.


Title: Re: About the recent server compromise
Post by: AGD on June 08, 2015, 08:47:47 AM
So NFOrce reset the server's root password for him, giving him complete access to the server

Is this normal for ISPs to have the sort of access that allows them to reset any server root password??? That is insane!!!
No, it is not. What would happen if theymos actually forgot his password and they couldn't reset it?
You can't prevent social engineering, no matter what you do.

Usually ISPs have contact information, like phone number, home adress, passport scan etc which can easily be used to verify a person. When combined with PGP, whis should be almost 100% safe.

and that's the point. social engineering depends on human error.

My point is, that you can prevent social engineering with a good training of your staff. That money is always good invested, because it gains trust from the customer. Now, after all these hacks that had happened in the past, theymos should have chosen the right ISP with the right policy already a long time ago.

edit:

just an example:

http://www.esecurityplanet.com/views/article.php/3908881/9-Best-Defenses-Against-Social-Engineering-Attacks.htm

Quote

...
 
1. Educate yourself.

"Our first mitigation is security through education," Hadnagy said. "If people aren't educated to the types of attacks being used, then they cannot possibly defend against them."
Social-Engineer.org provides a number of information resources on social engineering attacks. The two most commonly used and effective approaches, or "pretexts," used in the contest were posing as an internal employee or posing as someone hired by corporate to perform an audit or take a survey.
"Contestants used the survey pretext a lot," Hadnagy said. "It allowed them to ask questions that are believable in that context."
Hadnagy noted that employees rarely sought to confirm the pretext with another source, like a manager, before giving away information.

 
2. Be aware of the information you're releasing.

This tip encompasses both verbal communication and social media like Facebook or Twitter. Hadnagy noted that serious social engineers, as opposed to someone participating in a contest for fun, would get deep background on their targets before moving.
"You would know where they live," he said. "You would know whether they're happy or unhappy in their jobs."


3. Determine which of your assets are most valuable to criminals.

Even companies that actively seek to protect themselves from social engineering attacks often focus on protecting the wrong things, according to Jim O'Gorman, a security consultant and member of Social-Engineer.org.
"When a lot of companies focus on protecting their assets, they're very focused on that from the perspective of their business," O'Gorman said. "That's not necessarily the way an attacker will look at your company. They'll look for assets that are valuable to them, assets that they can monetize."
"Information perceived as having no value will not be protected," Social-Engineer.org said in the primary findings of its report. "This is the underlying fact that most social engineering efforts rely upon, as value to an attacker is different than value to an organization. Companies need to consider this when evaluating what to protect, considering more than just the importance of value to the delivery of service, product, or intellectual property."
O'Gorman said an independent assessment is the best tool to determine which of your assets criminals are most likely to target.

 
4. Write a policy and back it up with good awareness training.

Once you know which of your assets are most tempting to criminals and the pretexts they're most likely to use to pursue them, write a security policy for protecting your data assets. Then back up that policy with good awareness training.
"A policy is just a written statement," Hadnagy said. "It doesn't mean anything if people don't follow it."
In the primary findings of its report on the contest, Social-Engineer.org noted, "For awareness training to be truly effective it requires complete coverage of all employees. In many instances contestants would contact call centers, which often do not have as complete of awareness training programs. This translated into information leakage that could have been avoided, as well as significant increase of risk to the target organizations. Demonstration of the ineffectiveness of awareness training was apparent by the lack of employee resistance to answering questions."
Social-Engineer.org believes employees need a clear set of guidelines in place to respond well to a given situation. Absent such guidelines, employees will default to actions they perceive as helpful, which often means giving away information they shouldn't.

 
5. Keep your software up to date.

Hackers using social engineering techniques are often seeking to determine whether you are running unpatched, out-of-date software they can exploit.
"A lot of the information given out really would not be damaging if the target keeps his software up to date," Hadnagy said.
Staying on top of patches and keeping your software updated can mitigate a lot of risk.

 
6. Give employees a sense of ownership when it comes to security

"Security programs in this country are failing miserably," Hadnagy said. "The reason is that they're not personal. They don't make security a personal thing. Employees need to feel a sense of ownership when it comes to security."
O'Gorman added, "I think it's important that employees understand that what applies in the workplace also applies at home. Make it personal to that extent. Changing habits, changing culture is extremely difficult."
Both noted that criminals will not respect boundaries between one's work life and one's personal life, and any personal information obtained from a compromised work computer may also compromise one's personal life.

 
7. When asked for information, consider whether the person you're talking to deserves the information they're asking about.

This is where the rubber meets the road. Whenever you are in a conversation with someone you don't know, before you answer a question they ask, make sure they deserve to know the information that they're asking about.
In most cases, the person you're talking to has no need to know what version of an operating system you're running, or who handles trash collection at your company.
As Hadnagy is fond of pointing out, social engineers know that most people instinctively try hard to be helpful to their fellow human beings when asked. Social engineers leverage that instinct to their advantage. Companies certainly want their employees—especially customer-facing employees—to be friendly and helpful, but they must also temper that helpfulness with restraint.
For instance, an employee in sales wants to be as helpful to a potential customer as possible. But that employee should still make sure that the questions the potential customer is asking are relevant before answering.
"From a sales point of view, it's hard to say that," Hadnagy said. "If you're a sales guy, you don't want to lose that potential sale. You have to determine if the information you're giving out really is relevant to the potential sale."

 
8. Watch for questions that don't fit the pretext.

The last tip leads directly into this one. If a person asks a question that does not fit the persona they present, it should set off alarm bells.
"In a business sense, I think you have to be really aware of questions that do no match the person on the phone," Hadnagy said.
 Additionally, a sudden sense of pressure or urgency is often a sign.
"When you're on the phone with someone, or you're talking to someone, and all of a sudden you feel this pressure to make a decision, to take an action, you have to stop and think where is this pressure coming from? They'll try to put pressure on the target so they don't have time to think about their decision," O'Gorman said. "Don't get caught up in the story that's being told to you. A sense of pressure that shouldn't be there, that's a big red flag."

 
9. Stick to your guns.

If you do get a feeling that someone is fishing for information that they shouldn't, stick to your guns.
"If someone asks for information that you don't know if you should release, ask your manager," Hadnagy said. "Many social engineers will break if off if there's a break in the conversation."
Hadnagy pointed to one call during the contest in which the employee who received the call put up some resistance, but ultimately gave in to the social engineer's persistence.
"The employee actually had a pretty good sense," Hadnagy said. "Three times, he said, ‘our corporate policy is that you e-mail these questions, and we answer them together as a team.’ That whole phone call would have failed from a social engineering standpoint if that employee had stuck to his guns."

 

Thor Olavsrud is a contributor to eSecurityPlanet.com and a former senior editor at InternetNews.com. He covers operating systems, standards and security, among other technologies.


Title: Re: About the recent server compromise
Post by: 2112 on June 08, 2015, 05:48:41 PM
I see more ignorant posts being made by idiots in the field of actual computer security, not salesmanship.

not really. social engineering is omnipresent and can happen everywhere. hopefully the new ISP has some stricter quality management and certain processes to prevent it.
No, it is not. What would happen if theymos actually forgot his password and they couldn't reset it?
You can't prevent social engineering, no matter what you do.

This type of attack is easily preventable. I'm just going to quote myself again. Further discussion and explanations are available in the parallel threads in this subforum.

Easily preventable on two levels:

1) collocate your own equipment in a remote data center. The customer service staff will simply have no access to it besides being able to press buttons on the box.

2) use non-commodity hardware like Oracle SPARC or IBM POWER or HP Integrity/Itanium.  Then even if they manage to steal it they most likely will not be able to get the data off of it without specialized assistance.

Edit: Also, don't run Linux on those machines, but their native OS: Solaris, AIX, HP/UX respectively.



Title: Re: About the recent server compromise
Post by: Syke on June 08, 2015, 10:38:07 PM
No, it is not. What would happen if theymos actually forgot his password and they couldn't reset it?
You can't prevent social engineering, no matter what you do.

LOL! A server admin needs a mommy to reset his password for him? I'm sorry, but if you can't keep your root password safe, you don't deserve to be a server admin. No one ever needs to know the root passwords to my servers. No one. Ever.


Title: Re: About the recent server compromise
Post by: sbogovac on June 08, 2015, 10:54:38 PM
No, it is not. What would happen if theymos actually forgot his password and they couldn't reset it?
You can't prevent social engineering, no matter what you do.

LOL! A server admin needs a mommy to reset his password for him? I'm sorry, but if you can't keep your root password safe, you don't deserve to be a server admin. No one ever needs to know the root passwords to my servers. No one. Ever.

So servers should die with their admins?


Title: Re: About the recent server compromise
Post by: Xian01 on June 08, 2015, 11:06:40 PM
No one ever needs to know the root passwords to my servers. No one. Ever.
To be fair, my wife knows the root passwords on all my machines/servers incase I face an untimely death.


Title: Re: About the recent server compromise
Post by: 2112 on June 09, 2015, 01:47:44 AM
So servers should die with their admins?
Ha, ha!  I like it!

But seriously, the normal course of action is to terminate sysadmins who are incapable of producing the proper credentials to the equipment they manage. "Termination" doesn't mean "killing", just "firing from employment 'for cause'".

There was an really interesting case of a network sysadmin for San Francisco municipial government that went insane (schizophrenia/paranoia) and refused to disclose passwords to the Cisco equipment which he was supervising. Sorry, I don't have a link handy.


Title: Re: About the recent server compromise
Post by: sbogovac on June 09, 2015, 07:56:56 AM
So servers should die with their admins?
Ha, ha!  I like it!

But seriously, the normal course of action is to terminate sysadmins who are incapable of producing the proper credentials to the equipment they manage. "Termination" doesn't mean "killing", just "firing from employment 'for cause'".

There was an really interesting case of a network sysadmin for San Francisco municipial government that went insane (schizophrenia/paranoia) and refused to disclose passwords to the Cisco equipment which he was supervising. Sorry, I don't have a link handy.

Hehehe, but I meant it literally too...

What if an admin dies? Should access to the servers die with him?

I would argue: no. So - in addition to your "mental illness" example - there are definitely reasons why several people should always know the root passwords to any servers (except of those which are so personal they actually should "die with their admins"... obviously...).


Title: Re: About the recent server compromise
Post by: mmortal03 on June 09, 2015, 03:07:26 PM
No one ever needs to know the root passwords to my servers. No one. Ever.
To be fair, my wife knows the root passwords on all my machines/servers incase I face an untimely death.

No mommy needed, just a wifey.


Title: Re: About the recent server compromise
Post by: 2112 on June 09, 2015, 04:41:13 PM
What if an admin dies? Should access to the servers die with him?
Every organization I've seen has disaster recovery procedures. Just follow them. The comments I made earlier about "terminating sysadmins" pertain to terminating those who don't follow them for one reason or the other. It really isn't a computer-science-specific problem, more like general organizational management problem.

With one man shops (like bitcointalk.org) the situation is simplified. Loss of access requires disassembly of the server to reset its password protections. If there was encryption in use, those data are (most likely) irretrievably lost and the server requires reinstallation with the fresh software. The reset/reimage is not something that can be done quickly, surreptitiously or socially-engineered into the normal workflow of the customer service of the data center. I've never heard of anyone successfully performing such an attack, but I've heard of performing similar attack where the goal wasn't to steal the data but to steal the hardware.

I personally wouldn't bother thinking much about it. In all cases that I've seen/experienced the password loss was temporary, i.e. the person recalled/found the proper password after giving it some time. The true loss happened only if there wasn't anything important on the server anyways.

The real, practical danger with one-man shops is not the password loss, but grave mistakes, that corrupt the data on the server without getting noticed.


Title: Re: About the recent server compromise
Post by: Syke on June 09, 2015, 11:31:18 PM
So servers should die with their admins?

My servers are of a personal nature, so yes, I'd rather have the servers die with me than be hacked. For an organization, root passwords can be stored in a secure location, and known by a select few admins. I can see no reason ever for an ISP to have root access (unless of course it's a server with no real value).

I've worked with DoD facilities. They would never pass root passwords to upstream ISPs.


Title: Re: About the recent server compromise
Post by: 2112 on June 10, 2015, 12:06:04 AM
I've worked with DoD facilities. They would never pass root passwords to upstream ISPs.
I'm more of a small/middle-business person, so I can better understand the issues faced by small shops renting space in the data center cages.

How does the above DoD example compare with a personal web site for a porn-star/ex-model? How come a woman with incomplete high-school education can be astute enough to understand the issues of who can have access to database of her customers? Granted, she was about 40 y.o. at that time, but certainly wasn't a rocket-science intellect.