Bitcoin Forum

Bitcoin => Bitcoin Technical Support => Topic started by: peach on June 27, 2011, 05:13:21 AM



Title: A Couple of Questions on Wallet Hackers
Post by: peach on June 27, 2011, 05:13:21 AM
I realize that getting an unsecured wallet file hacked isn't too rare.

How exactly are people getting these trojans/keyloggers onto their computer? It seems as though every time I see a thread about someone getting hacked they exclaim they do not understand how someone got into their computer.

Also, do you think the latest definitions files for a program like Malwarebytes can detect all of this malware?


Title: Re: A Couple of Questions on Wallet Hackers
Post by: gigabytecoin on June 27, 2011, 05:43:56 AM
The malware always infects a few people first before Malwarebytes or a similar company can come up with a "definition" of said malware to search for and exterminate from their machines.

It's not the wallet file that's being "hacked into", it's your computer.

Soon enough there will be much greater security built into Bitcoin. Remember we are still only on version 0.23 beta here!

Whenever I have been "hacked" it is usually from visiting some shady website that has installed a drive by downloading type of program and I have failed to update my browsing software (and am running windows).

Just recently I had purchased a brand new laptop... had some friends over to watch a streaming sports event (shady websites) and had the computer completely infected with a virus and un-operable on the internet within about 3 hours of using it!

I just installed ubuntu and forgot about the whole thing.


Title: Re: A Couple of Questions on Wallet Hackers
Post by: sakkaku on June 29, 2011, 02:05:58 AM
There are actually hordes upon hordes upon hordes of machines infected with malware.  People are retarded, download files and refuse to update their systems.  The malware has to be analyzed and added to a glorified blacklist for detection and removal as stated above.  You can't easily tell if a program is "good" or "bad".  There isn't enough difference from say a program that uploads your family photos to say one that steals all your credit cards and passwords and uploads them.  Even supposed "whitelist" ecosystems like the iPhone still get malware that leaks user information (geospatial position, ip, etc).