Bitcoin Forum
May 03, 2024, 12:20:09 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 [99] 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 »
1961  Local / Nederlands (Dutch) / Re: Merit in Nederlandstalige community on: June 04, 2018, 04:51:55 AM
Meeste posts in he Nederlandse forum zijn niet erg lang en meeste Nederlanders kunnen goed Engels verstaan. De Russen hebben ook veel merits voor anti spam actie uitgegeven (waar merit niet echt voor bedoeld is - maar het helpt wel met verbeteren van de kwalietijt van de posts).   Discussie hier

Ik lees vaak het Russische forum en de kwalitijt van de posts is soms heel goed.

Ik denk dat meeste Nederlanders op het "main" bitcointalk forum posten. Het  Local > Nederlands forum is niet erg druk.

Kwaliteit posts is veel meer belangrijk dan merit. "Shilling" is niet merit waardig.

I'm hoping that this system will increase post quality by:
 - Forcing people to post high-quality stuff in order to rank up. If you just post garbage, you will never get even 1 merit point, and you will therefore never be able to put links in your signature, etc.
 - Highlighting good posts with the "Merited by" line.

Andere local forums hebben veel meer posts als het resulaat van merit farmers die hoge rank willen hebben voor hogere beloningen in signature campaigns.

Als je je ziel wilt verkopen aan en ICO of gok bedrijf voor een signature campaign dan kan rank balangrijk zijn maar ik geef her zelf geen donder over.

Sentimenteel uitgebraakt onderwerpen en ego vertroetelen krijgt vaak merit. Ik lees liever minder onzin.

Top-merited onderwerpen, all-time

merit statistieken

100 Dagen Merit

1962  Other / Meta / Re: Images not loading on: June 03, 2018, 02:56:08 PM
Me neither. Maybe an issue with the image proxy?

For now, click the quote button to see the image URL and copy/paste it directly in your browser.

Initially some pictures were showing but after I cleared my cache and tried another computer - nothing.

https://bitcointalk.org/index.php?topic=4413232.msg39286483#msg39286483

Others are having issues too.
1963  Other / Meta / Re: Picture broke my life on: June 03, 2018, 02:52:24 PM
https://bitcointalk.org/index.php?topic=2605179.msg26574474#msg26574474

Symilar problem to December 2017
1964  Other / Meta / Images not loading on: June 03, 2018, 02:23:45 PM
Not sure if it is a problem unique to me or whether it is from the forum.

When loading pages it doesn't load any of the images. Do others have the same problem ?

EDIT: Looks like I'm not alone.

Maybe similar issue to December 2017 https://bitcointalk.org/index.php?topic=2605179.msg26574474#msg26574474
1965  Economy / Exchanges / Re: How to avoid getting your exchange account HaCkEd or pHiShEd on: June 03, 2018, 02:00:33 PM
Wow, man, great article! You put lot of effort to write it. I see that you detailed probably all aspects related exchanges accounts hacking/phishing attempts. But so far I haven't saw fake accounts of exchanges being verified by Twitter. Do you have some examples?
These hackers/scammers are getting really smart and they always find new ideas how to scam people. But the main problem that many people just aren't careful enough, they aren't following even basic security advises. It seems that some people will learn only when they will be scammed..


The verification scams run at many levels.

https://www.coindesk.com/twitter-scammers-use-verified-accounts-trick-crypto-holders/ Fake verified Tron Foundation and its founder, Justin Sun

One scam was to get verified and then change the twitter name to who-ever they wanted to impersonate. A symilar method is used to get fake site security certificates.

https://www.siliconrepublic.com/enterprise/twitter-ad-verification [FAKE]twitterverifiedapplication.com[FAKE] is phishing users wanting to become verified.

Twitter suspended the verification scheme after verification of Jason Kessler. (One of the organizers of the white supremacist rally in Charlottesville).


I've updated the original post to include this example.
1966  Other / Meta / Bitcointalk history of MtGox and how a Bitcointalk post caught the MtGox hacker. on: June 03, 2018, 12:44:34 PM
2010 Karpeles was accused of computer fraud before moving to Japan
Karpeles has been implicated in hacking and price manipulation before. In 2010,the Mt. Gox CEO was sentenced in a Paris court to a year in prison in absentia for hacking. He was living Tokyo and involved in Bitcoin at the time.

Under French law, Karpeles is not considered a criminal but rather “un délinquant,” a delinquent offender.
https://arstechnica.com/tech-policy/2014/08/why-the-head-of-mt-gox-bitcoin-exchange-should-be-in-jail/
http://gawker.com/does-mt-goxs-ceo-have-a-secret-history-of-online-payme-1534752110
https://www.documentcloud.org/documents/1227216-karpeles-english.html
https://www.documentcloud.org/documents/1227215-judgement-karpeles.html
https://bitcointalk.org/index.php?topic=477211.msg5678671#msg5678671

Quote
Indeed, during my misspent youth, I made a huge, huge mistake. Enough silliness that I found myself locked into custody and brought temporarily placed in the "mousetrap" (souricière: possibly "n.f. (pol.): 'Baited trap' laid by the forces of law-and-order."). This was followed by an investigation of more than a year, which eventually ended in a trial.
I will not give too much detail about what I did wrong, just say it concerns payment systems on the Internet. I spent two years taking risks becoming larger, perhaps because it was an exciting side … whatever, I ended up getting arrested (in rather bizarre circumstances, noting that when I was arrested, I was just in a police station to file a complaint for something else). Anyway, I was released four days later and placed under "judicial review". Basically I did not have the right to leave France and I had to go regularly to the courthouse to speak to someone who was going to see if I lived in "the right way".
...
In the end, the trial was not concluded too bad for me (3 months suspended sentence disappearing after 5 years, and nothing in the criminal record).
(Translated from french)

July 18, 2010, MtGox Announced  by programmer Jed McCalib (who later went on to found Ripple) BTC $0.07
Initially created in 2006 as a platform for trading playing cards but not launched.
Magic: The Gathering Online eXchange, which is where the Mt. Gox name comes from was announced on bitcointalk and launched on this day.
https://bitcointalk.org/index.php?topic=444.0

March, 2011, MtGox sold by programmer (Ripple co-founder) Jed McCalib to to French developer and bitcoin enthusiast 26 year old Mark Karpeles.
The exchange allegedly had already lost 80 000 bitcoins but this was not disclosed to the public.
McCaleb also said that Mark Karpeles had rewritten the MtGox codebase back in 2011 after the sale was completed.

Quote
Although I knew that 80,000 BTC were already missing from Mt. Gox when Jed McCaleb sold it to Mark Karpèles — McCaleb suggesting to Karpèles “maybe you don’t really need to worry about it” — hackers had already cleaned out Mt. Gox while McCaleb owned it. He had sold Karpèles an insolvent exchange.
https://davidgerard.co.uk/blockchain/2017/09/17/kim-nilsson-of-wizsec-how-the-bitcoins-were-stolen-from-mt-gox/

June 19, 2011, DIRECT DOWNLOAD LINK FOR LEAKED MT. GOX ACCOUNT DATABASE (CSV FILE) BTC$17.77 and drops to $16.88 over 10 days
https://bitcointalk.org/index.php?topic=19576.0
https://web.archive.org/web/20110919162635/https://mtgox.com/press_release_20110630.html

June 20, 2011, Kevin the guy who bought 259684 BTC for under $3000

https://bitcointalk.org/index.php?topic=20207.0

A security breach of the Mt. Gox bitcoin exchange caused the price of bitcoin to fraudulently drop to one cent on the Mt. Gox exchange, after an unknown hacker allegedly used credentials from a Mt. Gox auditor's compromised computer to transfer a large number of bitcoins illegally to himself.

June 20, 2011, I'm MtGox, here's my side.
https://bitcointalk.org/index.php?topic=20250.0

June 2011 MtGox incident:
https://bitcointalk.org/index.php?topic=576337#post_toc_21

June 20, 2011, Big transaction.
In order to prove that Mt. Gox still had control of the coins, the move of 424,242 bitcoins from "cold storage" to a Mt. Gox address was announced beforehand, and executed in Block 132749
https://blockchain.info/block-index/147599

September 11 2011
Quote from:  theymos
Mark Karpeles is now hosting the forum's server.
https://bitcointalk.org/index.php?topic=42572.0

October 28, 2011, Mt. Gox Loss
In October 2011, about two dozen transactions appeared in the block chain (Block 150951)that sent a total of 2,609 BTC to invalid addresses. As no private key could ever be assigned to them, these bitcoins were effectively lost.
https://bitcointalk.org/index.php?topic=576337#post_toc_27

February 22, 2013, following the introduction of new anti-money laundering requirements by e-commerce/online payment system company Dwolla, some Dwolla accounts became temporarily restricted.


March 2013, the bitcoin transaction log or "blockchain" temporarily forked into two independent logs, with differing rules on how transactions could be accepted. The Mt. Gox bitcoin exchange briefly halted bitcoin deposits



April 18, 2013, Increased Trading Volume Breaks Mt. Gox BTC $181.66 over 10 days drops to $122.90

April 18, 2013,MtGox withdrawal delays [Gathering]
Customer complaints about long delays were mounting as of February 2014, with more than 3,300 posts in a thread about the topic on the Bitcoin Talk online forum.
https://bitcointalk.org/index.php?topic=179586.0

May 2, 2013 CoinLab filed a $75 million lawsuit against Mt. Gox, alleging a breach of contract

May 14, 2013, Mt. Gox Dwolla account frozen by DHS BTC $114.33 over 10 days rises to $128.80
On 15 May 2013 the US Department of Homeland Security  seized money from Mt. Gox's U.S. subsidiary's account with payment processor Dwolla asserting  that the subsidiary was not licensed by the US Financial Crimes Enforcement Network (FinCEN), was operating as an unregistered money transmitter in the US.

During the negotiations Karpeles’s attorneys allegedly brought up Silk Road . They said that Mark Karpeles was willing to give up Silk Road operator “Dread Pirate Roberts” if he “could get a walk on his charges.”

June 29, 2013, Mt. Gox received its money services business (MSB) license from FinCEN

https://bitcointalk.org/index.php?topic=205396.0
https://bitcointalk.org/index.php?topic=205542.0


June 20, 2013.[41] The Mizuho Bank branch in Tokyo that handled Mt. Gox transactions pressured Mt. Gox from then on to close its account.US dollar withdrawals were suspended .
On July 4, 2013, Mt. Gox announced that it had "fully resumed" withdrawals, but as of September 5, 2013, few US dollar withdrawals had been successfully completed.

August 5, 2013, Mt. Gox announced that it incurred "significant losses" due to crediting deposits which had not fully cleared, and that new deposits would no longer be credited until the funds transfer was fully completed

October 02, 2013, Bitcointalk hacked by "The Hole seekers". Off-line till October 07, 2013
  
After this event theymos stated:
I believe that this is how the attack was done: After the 2011 hack of the forum, the attacker inserted some backdoors. These were removed by Mark Karpelles in his post-hack code audit, but a short time later, the attacker used the password hashes he obtained from the database in order to take control of an admin account and insert the backdoors back in.

Mt. Gox Collapse
https://bitcointalk.org/index.php?topic=576337#post_toc_61

November 29, 2013. Mt Gox BTC price hits peak. (BTC $1132.26 drops over 10 days to $921.97)

February 7, 2014, Mt. Gox halts all bitcoin withdrawals.

MtGox issued a press release on February 10, 2014, stating that the issue was due to transaction malleability: “A bug in the bitcoin software makes it possible for someone to use the bitcoin network to alter transaction details to make it seem like a sending of bitcoins to a bitcoin wallet did not occur when in fact it did occur. Since the transaction appears as if it has not proceeded correctly, the bitcoins may be resent. Mt Gox is working with the bitcoin core development team and others to mitigate this issue.

February 17, 2014, with all Mt. Gox withdrawals still halted and competing exchanges back in full operation.


February 20, 2014, with all withdrawals still halted, Mt. Gox issueds another statement, not giving any date for the resumption of withdrawals.A protest by two bitcoin enthusiasts outside the building that houses the Mt. Gox headquarters in Tokyo continued. Citing "security concerns", Mt. Gox moved its offices to a different location in Shibuya. Bitcoin prices quoted by Mt. Gox dropped to below 20% of the prices on other exchanges


https://i.imgur.com/glFNsG8.png

February 23, 2014, Mt. Gox CEO Mark Karpelès resigned from the board of the Bitcoin Foundation and removed his twitter accounts. (since re-instated https://twitter.com/MagicalTux )

February 24, 2014, Mt. Gox suspended all trading, its website goes offline, returning a blank page. BTC $547.09 over 10 days $662.57

A leaked alleged internal document claimed that the company was insolvent – it had lost 744,408 bitcoins in a theft which went undetected for years.


I'm sorry I led people to trust Mtgox.
I'm sorry I allowed Mtgox to use me in this way.
I'm sorry I ever made that video to help Mtgox.  
It seemed like the right thing at the time.

But I'm sick of people claiming I said Mtgox was was solvent!
I NEVER SAID THAT, EVER!
Liquidity != Solvency

I chose my words very carefully.
That is why I read them from my own script.
I said Mtgox had lots of LIQUIDITY 7 months ago when I made that video.
That was certainly true, but is completely different from saying that they were solvent.


Transcript:
I'm Roger Ver, long time Bitcoin advocate and investor.
Today I'm at the Mtgox world headquarters in Tokyo Japan.
I had a nice chat with MTGOX CEO, Mark Karpeles, about their current situation.
He showed me multiple bank statements, as well as letters from banks and lawyers.
I'm sure that all the current withdrawal problems at MTGOX are being caused by the traditional banking system, not because of a lack of liquidity at MTGOX.
The traditional banking partners that MTGOX needs to work with are not able to keep up with the demands of the growing Bitcoin economy.
The dozens of people that make up the MTGOX team are hard at work establishing additional banking partners, that eventually will make dealing with MTGOX easier for all their customers around the world.  For now,  I hope that everyone will continue working on Bitcoin projects that will help make the world a better place.


Roger Ver

February 25, 2014,Mark Karpeles deaththreats?
Death threats are being received and such posts are causing a problem for Bitcointalk moderators.
https://bitcointalk.org/index.php?topic=486622.0



Some of the veiled threats got some sarcastic replies:

Quote from: bluemeanie1
post your death threats to Bitcointalk.org.  Fun for the whole family.

-bm
https://bitcointalk.org/index.php?topic=667023.msg7533904#msg7533904

February 28, 2014, Mt. Gox filed in Tokyo for a form of bankruptcy protection from creditors called minji saisei
https://www.mtgox.com/img/pdf/20140521_announce.pdf
https://bitcointalk.org/index.php?topic=179586.msg6852155#msg6852155


February 28, 2014,[GOX] Crime Scene Investigation, Case #MG744
https://bitcointalk.org/index.php?topic=492776.0;all

Mt. Gox also faced lawsuits from its customers.

March 03, 2014, Today filed a motion for civil rehabilitation proceedings for Mt Gox
https://bitcointalk.org/index.php?topic=498120.0

March 09, 2014, Mt. Gox filed for bankruptcy protection in the US, to halt U.S. legal action temporarily by traders who alleged the bitcoin exchange operation was a fraud.
https://www.mtgox.com/img/pdf/20140523_notice.pdf
https://bitcointalk.org/index.php?topic=179586.msg6889659#msg6889659

March 20, 2014, Mt. Gox reported on its website that it found 199999.99 bitcoins — worth around $116 million — in an old digital wallet used prior to June 2011. The total number of bitcoins the firm lost is now down to 650,000, from 850,000

It was estimated that up to 30% of the transactions on MtGox were due to Silk road.

May 26, 2014, The willy report
The “Willy bot”—was artificially inflating its account balance and using the money to buy Bitcoins. When Mt. Gox ran low on Bitcoins, Willy helped make up the shortfall. Sometimes its trades went the other way, selling borrowed Bitcoins to generate cash. Critics speculate that it was a fraudulent, if failed, exercise to keep Mt. Gox afloat.
https://bitcointalk.org/index.php?topic=179586.msg6940908#msg6940908
https://willyreport.wordpress.com/2014/05/25/the-willy-report-proof-of-massive-fraudulent-trading-activity-at-mt-gox-and-how-it-has-affected-the-price-of-bitcoin/

To whom it may concern,

 

This is a notice related to the bankruptcy proceedings of MTGOX Co., Ltd. (the Tokyo District Court 2014 (fu) no. 3830), which we are sending to you pursuant to the request from the Tokyo District Court.

 

On July 24, 2014, the Tokyo District Court 20th Civil Division issued an order to change the period for filing proofs of claims and the date for investigation of claims as follows
(please refer to the attached file.).

Detailed information for the filing of proofs of claims, including the form of the filing document and the process of the filing will be disclosed through the website of MTGOX Co., Ltd. at a later date. Your patience would be very much appreciated.

MtGox bankruptsy documents (Japan & US)
https://www.mtgox.com/img/pdf/20140618_order.pdf

(Old Date)

Period for filing proofs of claims:     until November 28, 2014

Date for investigation of claims:       February 25, 2015 10:00am

(New Date)

Period for filing proofs of claims:     until May 29, 2015

Date for investigation of claims:       September 9, 2015 1:30pm

 

This email address (mtgox_trustee@noandt.com ) is used only for the purpose of sending messages, and we are unable to check and respond to any replies to this email address.

Since we plan to provide the information regarding the filing of proofs of claims and the bankruptcy proceedings by posting it on the website hosted by the bankruptcy trustee (http://www.mtgox.com/ ), please check this website.

 

Bankrupt MtGox Co., Ltd. Bankruptcy trustee Attorney-at-law Nobuaki Kobayashi

April 16, 2014, Mt. Gox gives up its plan to rebuild under bankruptcy protection, and asked a Tokyo court to allow it to be liquidated.

May 27, 2014, Coinlab files objection to re-opening MtGox
CoinLab, the former operations manager for Mt. Gox in the US and Canada, has filed an objection to the plan to revive the now-defunct exchange issued by Sunlot Holdings,
https://bitcointalk.org/index.php?topic=179586.msg6976215#msg6976215

May 29, 2014, unlock codes for Mtgox yubikeys leaked
https://bitcointalk.org/index.php?topic=631044.0

July 30, 2014, [SCAM] The (fake) compensation process of deposits in Bitcoin market MtGox.com.
https://bitcointalk.org/index.php?topic=716917.0


Since its collapse, a number of Mt. Gox employees have spoken about how Mt. Gox was operating, with a picture being painted of a disorganized and discordant organization, with poor security procedures, serious issues relating to the source code of the website and a number of serious issues arising in relation to the operation of the business.

January 6, 2015 In a interview, Kraken bitcoin exchange CEO Jesse Powell discussed being appointed by the bankruptcy trustee to assist in processing claims by the 127,000 creditors of Mt. Gox.

January 16, 2015,Karpeles the real DPR?
Revealed in testimony in the Silk Road case.
Quote
Homeland Security Investigations agent Jared Der-Yeghiayan testified on day 3 of the Silk Road hearing that he had actively pursued Mark Karpeles, the CEO of failed Bitcoin exchange Mt. Gox, as a suspect for the Dread Pirate Roberts
https://www.forbes.com/sites/sarahjeong/2015/01/16/dhs-agent-thought-mt-gox-ceo-was-dpr/#6645646e2c29
Quote
“While Mark Karpeles was terrible at following well-established web development practices, he did have the proficiency to run a website like Silk Road,” Emin Gün Sirer, Associate Professor of Computer Science at Cornell University
https://www.forbes.com/sites/sarahjeong/2015/01/16/dhs-agent-thought-mt-gox-ceo-was-dpr/#6645646e2c29
https://bitcointalk.org/index.php?topic=926348.0


Jared Der-Yeghiayan claims Karpeles was tipped off that he was under investigation for Silk Rd  by rogue agents.
https://freeross.org/wp-content/uploads/2018/02/Day_3-2015-Jan-15_Trial_347-560.pdf#page=151


April 19, 2015, [2015-04-19] wizsec.jp: The missing MtGox bitcoins

https://bitcointalk.org/index.php?topic=1031430.0

April 2015, New evidence presented by Tokyo security company WizSec led them to conclude that "most or all of the missing bitcoins were stolen straight out of the Mt. Gox hot wallet over time, beginning in late 2011."


Link to chart if the image doesn't load:
https://i.imgur.com/NZ0A0b9.jpg

April 14, 2015, Mt. Gox lawyers said that Karpelès would not appear for a deposition in a Dallas court, or heed a subpoena by FinCEN.

August 2015 CEO Karpelès was arrested by Japanese police and charged with fraud and embezzlement, and manipulating the Mt. Gox computer system (willy bot) to increase the balance in an account -- this charge was not related to the missing 650,000 bitcoins

Karpeles loses 35 kg in Japanese prison in four months

November 03, 2015, [2015-11-03] The Mt. Gox Bitcoin Debacle: An Update
https://bitcointalk.org/index.php?topic=1236467.0

May 26, 2016, Mt. Gox Creditors Seek Trillions Where There Are Only Millions
By May 2016, creditors of Mt. Gox had claimed they lost $2.4 trillion when Mt. Gox went bankrupt, which they asked be paid to them.The Japanese trustee overseeing the bankruptcy said that only $91 million in assets had been tracked down to distribute to claimants, despite Mt. Gox having asserted in the weeks before it went bankrupt that it had more than $500 million in assets.The trustee's interim legal and accounting costs through that date, were $5.5 million.
https://bitcointalk.org/index.php?topic=1485693.0
https://bitcointalk.org/index.php?topic=1485703.0


July 10, 2017, Mark Karpeles of Mt. Gox trial starts in Japan
https://bitcointalk.org/index.php?topic=2012824.0

July 27, 2017    [2017-07-27] WizSec disclose The Interaction Between BTC-e & Mt.Gox
https://bitcointalk.org/index.php?topic=2049335.0


July 2017, the U.S. Treasury’s Financial Crimes Enforcement Network (FinCEN) announced a $110 million fine against BTC-e for facilitating crimes like drug sales and ransomware attacks along with a separate $12 million fine against its owner, Alexander Vinnik.

The charges against Vinnik also accuse him of helping to orchestrate the hack of Mt. Gox.
Quote
BTC-e .. was heavily reliant on criminals, including by not requiring users to validate their identity, obscuring and anonymizing transactions and source of funds, and by lacking any anti-money laundering processes. The indictment alleges BTC-e was operated to facilitate transactions for cybercriminals worldwide and received the criminal proceeds of numerous computer intrusions and hacking incidents, ransomware scams, identity theft schemes, corrupt public officials, and narcotics distribution rings.
Instead of acting to prevent money laundering, BTC-e and its operators embraced the pervasive criminal activity conducted at the exchange. Users openly and explicitly discussed criminal activity on BTC-e’s user chat.

Computer security firm WizSec found an old post http://archive.is/6cFcY on Bitcointalk in which user WME had complained that another cryptocurrency exchange had frozen his funds. “Give [me] my CLEAN MONEY!” he stated in the post. WME gave clues that he owned some of the Bitcoin wallets. The same user posted a letter from his lawyer, his first and last name visible for the whole world to see. Nilsson from WizSec sent an email to Gary Alford, a special agent with the IRS in New York who has helped catch cybercriminals.

Bitcointalk user WME was identified as Vinnick when he made this post: https://bitcointalk.org/index.php?topic=85977.msg1037908#msg1037908

Other online activities by the same user account are alledged to link it to the hack on MtGox.
Investigations by Wizsec, a group of bitcoin security specialists, had identified Vinnik as the owner of the wallets into which the stolen bitcoins had been transferred, many of which were sold on BTC-e.
In September 2011, the MtGox hot wallet private keys were stolen, in a case of a simple copied wallet.dat file. This gave the hacker access to a sizable number of bitcoins immediately, but also were able to spend the incoming trickle of bitcoins deposited to any of the addresses contained.

Quote
Over time, the hacker regularly emptied out whatever coins they could spend using the compromised keys, and sent them to wallet(s) controlled by Vinnik. This went on for long periods, but also had breaks — a prominent second phase of thefts happened later in 2012 and 2013.
By mid 2013 when the funds spendable from the compromised keys had slowed to a near halt, the thief had taken out about 630,000 BTC from MtGox.
In addition, the shared keypool of the wallet.dat file lead to address reuse, which confused MtGox's systems into mistakenly interpreting some of the thief's spending as deposits, crediting multiple user accounts with large sums of BTC and causing MtGox's numbers to go further out of balance by about 40,000 BTC. The majority of these funds were hurriedly withdrawn by their recipients rather than being reported.
After the coins entered Vinnik's wallets, most were moved to BTC-e and presumably sold off or laundered (BTC-e money codes were a popular choice). In total some 300,000 BTC ended up on BTC-e, while other coins were deposited to other exchanges, including MtGox itself.
Some of the funds moved to BTC-e seem to have moved straight to internal storage rather than customer deposit addresses, hinting at a relationship between Vinnik and BTC-e.
The stolen MtGox coins were not the only stolen coins handled by Vinnik; coins stolen from Bitcoinica, Bitfloor and several other thefts from back in 2011 and 2012 were all laundered through the same wallets.
Moving coins back onto MtGox was what let us identify Vinnik, as the MtGox accounts he used could be linked to his online identity "WME". As WME, Vinnik had previously made a public outcry that coins had been confiscated from him (the coins in question coming from Bitcoinica).
There were other thefts and incidents explaining other missing funds from MtGox. More on that in later posts.
https://blog.wizsec.jp/2017/07/breaking-open-mtgox-1.html

Below is a summarized illustration highlighting the theft coin flow of September 2011 onwards:

The top area of the graph includes clusters unrelated to Vinnik, and appear to be part of a different theft.
Source: https://blog.wizsec.jp/2017/07/breaking-open-mtgox-1.html

August 03, 2017, MtGox Bitcoin Cash
Who owns that Bitcoin Cash?
Can it be sold to aid in the compensation of the MtGox users?

https://bitcointalk.org/index.php?topic=2062909.0

March 2018, the trustee Kobayashi said that enough BTC has been sold to cover the claims of creditors.
https://bitcointalk.org/index.php?topic=179586.msg37684073#msg37684073

Critical of MtGox trustee dumping coins.

https://i.imgur.com/jSYVSfj.png
https://bitcointalk.org/index.php?topic=179586.msg31806992#msg31806992

Quote
Karpeles said that running the bitcoin exchange, which started as a way to buy and sell “Magic: The Gathering” cards, was a “daily nightmare of dealing with banks, governments, people I never knew existed. Running Mt Gox was basically a constant race.”
Quote
“I would say it’s probably very close to like when you’re falling from a building,” Karpeles told BBC Radio 4’s “File On 4” show. “Obviously, the floor [was] getting close. It felt like I was about to die.”

May 13, 2018,  Greek law enforcement uncovered the plot to murder Alexander Vinnik
https://bitcointalk.org/index.php?topic=2181023.msg37147405#msg37147405

May 18, 2018,We’re coordinating legal action
Quote
Creditors of the Mt Gox bankruptcy proceedings. We’re coordinating legal action to stop more than $2,000,000,000 surplus from going to the people responsible for the exchange when it was hacked, and instead have it shared among creditors who were victims of crime.
https://bitcointalk.org/index.php?topic=179586.msg24392977#msg24392977
https://www.mtgoxlegal.com/

June 22, 2018,MtGox Trustee Halts Bitcoin Sell-Offs
Kobayashi: “The power and authority to administer and dispose of MTGOX’s assets is still vested exclusively in me, and I will implement the civil rehabilitation proceedings, including the administration of MTGOX’s assets and the investigation of claims, subject to the Tokyo District Court’s supervision,”
https://bitcointalk.org/index.php?topic=4517222.0


Mt. Gox official says they may start paying back their creditors as soon as next year. They claimed the initial discovery of the missing/hacked 850,000 Bitcoin in the year 2014, Mt. Gox has found 200,000 Bitcoin of them.

At the time of the Mt. Gox hack event in 2014, Bitcoin price was $483 which has a value of $96.6 mln for 200,000 Bitcoin.
The recovered funds have been frozen in the Mt Gox bankruptcy estate for four years, The recovered 200,000 Bitcoin is now worth an estimated $1.2 Bln in Bitcoin
 (at 1BTC=$6,100) without its forks, Bitcoin Cash.
Quite impressive investment, huh?

Kobayashi was responsible for selling vast tranches of Bitcoin reserves beginning Q4 last year to reimburse Mt. Gox users who lost money in the exchange’s mass hack in late 2013.

this is the only part of this all that matters! the START of the sale was last year DURING THE RISE. and people keep on focusing on the drop part. they literary started selling when price was $4000+ and while they were selling price kept on going up and reached $10k then $20k and all that time they were selling a lot of coins!

here is how it looks like:



Quote
“I wouldn’t dare say that the person who architected the Titanic should never again architect another ship.”
“Mark fought and fell. And although he fell, his skills, experience and know-how unarguably continue to exist,”
Andrew Lee, cofounder, chairman and chief of lab division at London Trust Media.

I tend to agree with this analysis:
March 02, 2014, Peter R Rizun’s Theory on the Collapse of Mt. Gox

Note:
A lot of people have unfairly lost money due to the actions of the hackers and ineffective security of MtGox. But I can’t help but still feeling a little bit sorry for Karpeles. He was young, made poor choices, tried but failed catrostophically.  He inherited a flawed system that was insolvent and poor record keeping allowed a hacker to siphon the accounts undetected. I would be keen to chat with people who know / knew Karpeles via PM.

Also, it might be noteworthy that for some time, DDOSing this forum coincided with dumps on then dominant Bitcoin exchange MtGox. I.e., you could DDOS this forum, which in turn made the price of Bitcoin drop. Market manipulation wild Wild West Cool

Lol, this is just toooooo funny

Kobayashi sells some bitcoins, price drops 10%
Kobayashi moves some bitcoins, price drops 10%
Kobayashi says he won't sell any coin anymore, price drops 10%

We should really be careful if this guy tweets he will go to the toilet we might see a drop of 20%

Main sources:
http://fortune.com/longform/bitcoin-mt-gox-hack-karpeles/
https://en.wikipedia.org/wiki/Mt._Gox
https://www.businessinsider.com/mt-gox-ceo-mark-karpeles-hacked-i-was-about-to-die-2018-3#OBDQt7MrmmMhr2Hh.99

This is an ongoing project and this post will be edited regularly. Corrections, additions and comments are welcome.
1967  Other / Meta / Re: Bitcointalk history of hacks and vandalism. on: June 03, 2018, 07:31:00 AM
https://www.ssllabs.com/ssltest/analyze.html?d=bitcointalk.org

1968  Other / Ivory Tower / Re: Protection against armed robbery of Bitcoin on: June 03, 2018, 01:38:04 AM
The best protection is "don't own anything worthwhile stealing".  Grin

Failing that -

Spread your risk. Hardware devices are cheap. Don't just own one. Own multiples. Different types of storage in different locations.

100 wallets are safer than everything in 1 wallet.

Keep your seed in a separate location from your hardware device.

Plan for all eventualities.

Have a pre-arranged plan for what to do if a robbery occurs.

Armed robbery is relatively low risk compared to other methods of theft or loss due to an external event.

Consider destruction due to fire, earthquake, war, volcanic eruption, hurricane, flooding, tsunami, solar flare, EMP, death, paralysis, theft by someone close to you, hackers, seizure by authorities, exchange collapse.

Have a backup plan if you lose physical access to a hardware device. (e.g. the secure deposit box is no longer accessible.)

Hardware devices can also be "hacked" if the hacker has physical access to it. So if you have it in a location you cannot control it can be accessed by thieves or the authorities.

Avoid linking your private details to your online identity.

1969  Other / Meta / Re: Bitcointalk history of hacks and vandalism. on: June 03, 2018, 12:03:28 AM
I did not knew that this forum has faced 3 hacks in the past. This is really something to worry about as out information is also disclosed to the hackers. Was the forum able to catch any hacker in any of the cases above ?

Hackers are very hard to catch. I don't think any of the hackers have been caught for the forum hacks.

I have a feeling--and I'm probably stating the obvious here--that a lot of hacked bitcointalk accounts have been sold outside of this forum, because I've seen numerous old-time accounts that suddenly woke up in October 2017, changed their writing style, and started posting in a typical bounty hunter fashion.  Shitposts in the Altcoin Discussion section, mostly.  I tagged a number of them one night after doing some "research" in that section.

This is definitely a good write up, OP.  I don't know much about hacking so I won't criticize the security of the site--but it would appear to be pretty lax.  But I'm sure a lot of that has to do with people not having strong passwords and so forth.  

A site run remotely from multiple locations is hard to secure. I'd say the site itself is reasonably secure. Individual accounts are a different story. I'm sure password1 and 1234 has been used on here.

Why CosbyCoin is not on the coinmarketcap? I have heard of it for the first time but want it already!

The http://www.buttcoinfoundation.org/tag/cosbycoin/  might have more info about it. Smiley

https://bitcointalk.org/index.php?topic=46945.msg558903#msg558903 I think it briefly existed.

Is there any chance to hack bitcointalk forum again? But not type hack like above. What I mean is like some hacker will make an anonymous account which immediately has legendary rank or another else maybe? Or someone can manipulate merits system? If it comes to be true, I'm afraid they can't be detected. As we know too many accounts before merits system is implemented, only use their activity can rank up and earn free merit without getting sMerit. Though they earn sMerit the proof of merit summary will disappear after 120 days.

There is always a chance of a hack. But there are many eyes watching this forum. Lessons learned from previous hacks and Vod has an analytics site http://dev.martinlawrence.ca/bpip/ that logs and watches bitcointalk.org. A lot of info is archived as well. A new instant legendary account is unlikely because it will be accompanied with a no post history. Your posts, unless deleted stay forever.
1970  Bitcoin / Bitcoin Discussion / Re: UK 1993 Lamborgini for less than 1 Bitcoin. on: June 02, 2018, 03:22:53 PM
Shocked Shocked Shocked dude you forget that that's is 25 years apart and obviously, bitcoin's value has dramatically changed in only 9,10 years something, let alone "money"

I thought it was cool you can get a Lambo for 1 BTC.
1971  Economy / Exchanges / Re: How to avoid getting your exchange account HaCkEd or pHiShEd on: June 02, 2018, 02:05:58 PM
This is very useful post and I hope it will help someone to prevent hack or get victim of phishing. It is true that is very hard sometime to recognize true from fake site, very often it is a very small and almost invisible difference which can be deceive even some more experienced users. Fortunately Google should start to ban all crypto related ads from this month, so it is realistic to expect that the number of such frauds will be much smaller.

However, hackers will probably find some other ways to target crypto users in an attempt to steal them their money. Last picture shows all steps which user should take to reduced risk to a minimum, but in my opinion language barrier is something that prevents many people from fully understanding that this problem exists. Something like this should be posted in sticky thread of all local boards (translated).

I hope they do pin it or use it as a source for a pinned post. At least two exchanges have used one of my earlier articles as a source for their anti phishing tutorial and I've provided it to a few coin devs as well. I feel really sorry for the people that have been phished and do hope that it prevents a lot of people from being victims of theft.

I bet my life on this that you were a scammer and a phisher before you can deny by i know  Cool
Now after you made money you are trying to be an angel right? just wow!  Smiley

No matter how much I deny it - you won't believe me.  Cry

I've helped a lot of people who have been scammed. It was the motivation for the first article I wrote for a different forum last year and have been updating ever since.
Prevention is much better than trying to get it back. (very low chance)
Spammers and scammers are my nemesis.
1972  Other / Meta / Re: Bitcointalk history of hacks and vandalism. on: June 02, 2018, 10:55:39 AM
Possibly they are related you are right that the 2015 one was certainly for malicious gain and the other two were more of a joke. I think that's because the 2015 actually gained access to the database where the others were injecting code.

I was logged in when the 2013 one happened, just sat there thinking WTF is this? Then it just seemed quite funny. The 2015 one I wasn't using the forum at the time but it was the beginning of receiving phishing emails at the address exposed then.


That is so cool that you experienced that. Being part of historic events. I wish I had taken more notice of crypto in the earlier days. I didn't look at crypto till the start of 2016. Crypto is a wild ride.

Theymos sheds light on the second hack in his announcement in 2013. The second hack is definitely related to the first.

Quote from: theymos
I believe that this is how the attack was done: After the 2011 hack of the forum, the attacker inserted some backdoors. These were removed by Mark Karpelles in his post-hack code audit, but a short time later, the attacker used the password hashes he obtained from the database in order to take control of an admin account and insert the backdoors back in. (There is a flaw in stock SMF allowing you to login as someone using only their password hash. No bruteforcing is required. This was fixed on this forum when the password system was overhauled over a year ago.) The backdoors were in obscure locations, so they weren't noticed until I did a complete code audit yesterday.
1973  Other / Meta / Re: Bitcointalk history of hacks and vandalism. on: June 02, 2018, 10:45:06 AM
I was going over old posts and archived material for a history of bitcointalk post and thought the earlier hacks were amusing (Although I'm sure Theymos was not amused).

I'm sure the first two events were probably related and mischievous. The second hack was probably related to silk road - it could be purely co-incidental.. It appears that the last hack was more of a malicious hack based on greed. It suppose it is the risk of running a site with lots of IT savvy users. Someone will try to hack.


We were due for one in 2017. Maybe it just comes in threes.

Possibly they are related you are right that the 2015 one was certainly for malicious gain and the other two were more of a joke. I think that's because the 2015 actually gained access to the database where the others were injecting code.

Found some fascinating trivia.  After the 2011 hack Mark Karpeles was hosting the server !
1974  Other / Meta / Re: Bitcointalk history of hacks and vandalism. on: June 02, 2018, 10:07:07 AM
Nice write up. Looks like we are overdue for another hack  Grin

I'm not sure the Silk Road and the other things were related but interesting to know that they were around similar time frames at least.



I was going over old posts and archived material for a history of bitcointalk post and thought the earlier hacks were amusing (Although I'm sure Theymos was not amused).

I'm sure the first two events were probably related and mischievous. The second hack was probably related to silk road - it could be purely co-incidental.. It appears that the last hack was more of a malicious hack based on greed. It suppose it is the risk of running a site with lots of IT savvy users. Someone will try to hack.


We were due for one in 2017. Maybe it just comes in threes.
1975  Other / Meta / Bitcointalk history of hacks and vandalism. on: June 02, 2018, 09:43:13 AM
Bitcointalk was hacked in [2011] , [2013] and [2015]

Previously the forum was hosted on sourceforge http://bitcoin.sourceforge.net/boards/index.php which is no longer reachable.
Founded by Satoshi Nakamoto. The domain name was owned by Sirius but is now controlled by Cøbra. The forum is administrated by theymos .
The forum was also reachable under forum.bitcoin.org for some time before it moved to bitcointalk.org IIRC.
The "name" of the forum is actually "Bitcoin Forum", not "Bitcointalk" (see upper left corner of this page).
Bitcointalk has cloudflare protection so finding out the current hosting provider is difficult.
https://bitcointalk.org/index.php?topic=3284381.msg34255007#msg34255007

September 09, 2011,  Bitcointalk.org Hacked by SomethingAwful.
Bitcointalk was hacked and defaced. "My browser's been Cosjacked!" Bill Cosby images were displayed.

Quote from: JeffK
My browser's been Cosjacked!
https://bitcointalk.org/index.php?topic=42548.msg517910#msg517910

Quote from: BlockHash
Hahaha this is pretty funny. Nothing about Bitcoin is safe these days.

Holy shit Cosby is everywhere!
https://bitcointalk.org/index.php?topic=42548.msg517910#msg517910

Quote from: BubbleBoy
Someone definitely put a huge effort into this. If all hackers were so funny.
https://bitcointalk.org/index.php?topic=42548.msg517927#msg517927

Quote from: nefanon
EDIT: To disable the Cosby Hack use AdBlock and block "bitcointalk.org/Smileys/default/final.js"  -  Thanks ShadowOfHarbringer and TechCF <3
https://bitcointalk.org/index.php?topic=42549.0

Quote from: theymos
Mark Karpeles is now hosting the forum's server.
https://bitcointalk.org/index.php?topic=42572.0






On September 3, an attacker used a 0-day exploit in SMF to gain administrative access to the forum. This went unnoticed until September 9, when he inserted some annoying JavaScript into all pages. The forum was at this point shut down.

The attacker was capable of running arbitrary PHP code, and he could have therefore copied all password hashes and read all personal messages. He also could have done all of the things that admins can normally do, such as editing/deleting/moving posts.

Passwords

It is not known for sure that the attacker copied any password hashes, but it should be assumed that he did.

SMF hashes passwords with SHA-1 and salts the hash with your (lowercase) username. This is unfortunately not an incredibly secure way of hashing passwords.

The password you used on the forum should be assumed to already be compromised if your password had:
- Less than 16 characters, numbers only
- Less than 12 characters, lowercase only
- Less than 11 characters, lowercase+numeric
- Less than 10 characters, lowercase+uppercase
- Less than 9 characters, lowercase+uppercase+numbers
- Less than 8 characters, all standard characters

If you have only 2-3 more characters than what I listed above, then you should assume that your password will be compromised at some point in the future.

No matter how strong your password was, it is a good idea to change your password here and wherever else you used it.

Database state

Backups exist of the previous database state, but it has been decided to continue with the latest state to avoid losing thousands of posts. If you notice that any posts are missing or changed, let me know.

Also, it's possible that the attacker took control of some accounts. If you are being impersonated, email me and I'll reset your password to its previous value.

More attack info

The attacker first paid for a donator account so he could change his displayed username. The displayed username field is not escaped properly, so he was able to inject SQL from there. He took over Satoshi's account, and from Satoshi's administrative interface he was able to inject arbitrary PHP code by modifying the style template.

The attacker probably used these user accounts, though his level of access would allow him to forge this data:
brad
EconomicOracle
Economic Oracle
SwimsuitPaul
BitcoinsInMyLoins

He probably used these IP addresses:
74.242.208.159
74.242.205.69
152.14.219.223
152.14.247.62
74.242.205.161
74.242.206.245
74.242.208.159
74.242.235.132
98.69.157.69
98.69.160.187
41.125.48.26
150.206.212.72

(Thanks to Mark Karpeles for finding most of this info.)

Change of hosting

Mark Karpeles is now hosting the forum's server. The forum is still owned by Sirius, as it has always been. There will be no policy changes.

Signed version of this message

Two months later Bitcointalk was looking for tenders for new forum software.
November 02, 2011, Looking for someone to create/modify software for this forum and 5500+ BTC raised for the project.
https://bitcointalk.org/index.php?topic=50617.0


October 02, 2013. Ross Ulbricht arrested, FBI Seize Deep Web Marketplace Silk Road
https://bitcointalk.org/index.php?topic=306338.0
https://bitcointalk.org/index.php?topic=310600.0

Quote
Just hours after it played a supporting role in the takedown of the Silk Road drug empire, the Bitcointalk.org website suffered a hack that exposed users' personal messages, e-mails, and password data.
https://arstechnica.com/information-technology/2013/10/bitcoin-talk-forum-hacked-hours-after-making-cameo-in-silk-road-takedown/?comments=1

October 02, 2013, Bitcointalk hacked by "The Hole seekers". Off-line till October 07, 2013 .
Some users blame the NSA and see it related to the Silkroad closure.
https://bitcointalk.org/index.php?topic=306723.0;prev_next=next
https://bitcointalk.org/index.php?topic=306724.0

Quote
-----BEGIN PGP SIGNED MESSAGE-----
 Hash: SHA256

 Unfortunately, it was recently discovered that the Bitcoin Forum's server
 was compromised. It is currently believed that the attacker(s) *could* have
 accessed the database, but at this time it is unknown whether they actually did
 so. If they accessed the database, they would have had access to all
 personal messages, emails, and password hashes. To be safe, it is
 recommended that all Bitcoin Forum users consider any password used
 on the Bitcoin Forum in 2013 to be insecure: if you used this
 password on a different site, change it. When the Bitcoin Forum
 returns, change your password.

 Passwords on the Bitcoin Forum are hashed with 7500 rounds of
 sha256crypt. This is very strong. It may take years for
 reasonably-strong passwords to be cracked. Even so, it is best to
 assume that the attacker will be able to crack your passwords.

 The Bitcoin Forum will return within the next several days after a
 full investigation has been conducted and we are sure that this
 problem cannot recur.

 Check http://www.reddit.com/r/Bitcoin/ and #bitcoin on Freenode for
 more info as it develops.

 We apologize for the inconvenience.

 -----BEGIN PGP SIGNATURE-----

 iF4EAREIAAYFAlJNCE8ACgkQxlVWk9q1kecABgD9H5sbb0DopdLsODAmv6LWmIaW
 kgfyYTlh8GezYbYx7c8A/iTh0/DCwaXuNKK/qUWpewR/L6HEOuAqa/ML1D+K9mZc
 =1NYs
 -----END PGP SIGNATURE-----

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Here's what we think happened:

8-14 hours ago, an attacker used a flaw in the forum's AnonymousSpeech registrar to change the forum's DNS to point to 108.162.197.161 (exact details unknown). Sirius noticed this 8 hours ago and immediately transferred bitcointalk.org to a different registrar. However, such changes take about 24 hours to propagate.

Because the HTTPS protocol is pretty terrible, this alone could have allowed the attacker to intercept and modify encrypted forum transmissions, allowing them to see passwords sent during login, authentication cookies, PMs, etc. Your password only could have been intercepted if you actually entered it while the forum was affected. I invalidated all security codes, so you're not at risk of having your account stolen if you logged in using the "remember me" feature without actually entering your password.

For the next ~20 hours, you should only log into the forum if you're quite sure that you're talking to the correct server. This can be done by adding '109.201.133.195 bitcointalk.org' to your hosts file (remember to remove it later!), or by using some browser plugin to ensure that you're talking to the server with TLS certificate SHA1 fingerprint of:
29:0E:CC:82:2B:3C:CE:0A:73:94:35:A0:26:15:EC:D3:EB:1F:46:6B

Simultaniously, the forum has been the target of a massive DDoS attack. These two events are probably related, though I'm not yet sure why an attacker would do both of these things at once.
-----BEGIN PGP SIGNATURE-----

A youtube video was made of the result of the hack:
https://www.youtube.com/watch?v=0FqIxh6Q-20





On October 3, it was discovered that an attacker inserted some JavaScript into forum pages. The forum was shut down soon afterward so that the issue could be investigated carefully. After investigation, I determined that the attacker most likely had the ability to execute arbitrary PHP code. Therefore, the attacker probably could have accessed personal messages, email addresses, and password hashes, though it is unknown whether he actually did so.

Passwords were hashed very strongly. Each password is hashed with 7500 rounds of sha256crypt and a 12-byte random salt (per password). Each password would need to be individually attacked in order to retrieve the password. However, even fairly strong passwords may be crackable after a long period of time, and weak passwords (especially ones composed of only a few dictionary words) may still be cracked quickly, so it is recommended that you change your password here and anywhere else you used the password.

The attacker may have modified posts, PMs, signatures, and registered Bitcoin addresses. It isn't practical for me to check all of these things for everyone, so you should double-check your own stuff and report any irregularities to me.

How the attack was done

I believe that this is how the attack was done: After the 2011 hack of the forum, the attacker inserted some backdoors. These were removed by Mark Karpelles in his post-hack code audit, but a short time later, the attacker used the password hashes he obtained from the database in order to take control of an admin account and insert the backdoors back in. (There is a flaw in stock SMF allowing you to login as someone using only their password hash. No bruteforcing is required. This was fixed on this forum when the password system was overhauled over a year ago.) The backdoors were in obscure locations, so they weren't noticed until I did a complete code audit yesterday.

After I found the backdoors, I saw that someone (presumably the attacker) independently posted about his attack method with matching details. So it seems very likely that this was the attack method.

Because the backdoors were first planted in late 2011, the database could have been secretly accessed any time since then.

It was initially suspected by many that the attack was done by exploiting a flaw in SMF which allows you to upload any file to the user avatars directory, and then using a misconfiguration in nginx to execute this file as a PHP script. However, this attack method seems impossible if PHP's security.limit_extensions is set.

The future

The forum is now on a new server inside of a virtual machine with many extra security precautions which will hopefully provide some security in depth in case there are more exploits or backdoors. Also, I have disabled much SMF functionality to provide less attack surface. In particular, non-default themes are disabled for now.

I'd like to publish the forum's current code so that it can be carefully reviewed and the disabled features can be re-enabled. SMF 1.x's license prohibits publishing the code, though, so I will have to either upgrade to 2.x, get a special copyright exception from SMF, or do the auditing myself. During this investigation, a few security disadvantages to 2.x were brought to my attention, so I don't know whether I want to upgrade if I can help it. (1.x is still supported by SMF.)

Special thanks to these people for their assistance in dealing with this issue:
- warren
- Private Internet Access
- nerta
- Joshua Rogers
- chaoztc
- phantomcircuit
- jpcaissy
- bluepostit
- All others who helped

Code:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

As of October 7 2013, the Bitcoin Forum has been restored to bitcointalk.org.
-----BEGIN PGP SIGNATURE-----

iF4EAREIAAYFAlJSRF8ACgkQxlVWk9q1keemWgD/WcvrsikPq6AHpEo20KGmQInp
FlyAWNbX74z65KJrsUEBAIcCzYnHZ7gAs49mlhSq1fR9o2LZCETV3BJveCTu7lAi
=b9Xb
-----END PGP SIGNATURE-----


November 06, 2014, Anyone else get an email trying to sell you bitcointalk.org and btc-e.com dumps?
I received this email yesterday:

Code:
From: kaltim@jasamarine.co.id
Reply to: kaltim@jasamarine.co.id

import database.sql c99 wso
Bitcointalk.org database.txt BTC-E Bitcoin dump.sql 64.9 MB Size WE SELL FULL DATABASE DUMP OF Bitcointalk.org + BTC-E.COM 2014  YES
SELL FULL DATABASE DUMP.SQL OF Bitcointalk.org + BTC-E.COM

HERE IS LIST OF WHAT WE HAVE FOR YOU.

Maybe You Ask For Why You Must Buy Dump.sql include Mails And Details Personale Users?
YOU ASK FOR WHAT?

1. Affiliate/invites
Casino/Poker/Forex Etc...

2. You Get Mails Very Big Size To Your Bussines Promotions RESULTABLE leads Target 100% Bitcoins Mails in Sql

3. You Be Make Nice Profit % Yes

you be earn multi profits
this very quality material for stable more biz to you


OVER 4+ GB OF DATA TOTAL: EMAILS, PASSWORDS, PINS, ETC FOR ALL USERS.
FULL .SQL FILE DUMP FORMAT
LEAKED BTC-E SOURCE CODE    
FULL DATABASE SQL DUMP

BitcoinPayment>Email Me->Give You TxT/SQL/Zip

if you interest buy

i calculate for you specific price
who interest make payment and buy for me I AM SURE 100%
THIS IN PRACTIC MY SKILL AND PROOFS IF YOU DREAM ABOUT THIS I OWNER THIS IN THIS MOMENT YES

OTHER BITCOIN EXCHANGE

BTC-E.COM
FULL DATABASE DUMP. EMAILS, PASSWORDS, USERS (850.000+) - 16-10-2014 *FRESH*
FULL .SQL FILE DUMP FORMAT

WE HACKED BTC-E; AND ASWELL WITH TRADINGS.


Bitcoin Address : 1shopAH6JmxABLCbbG4wNAUZVh3ZjtGfF

you interest?
Ok if you make payment i contact you and be help you
i sent back to you memo my jabber/icq details to chat individual to you if you be my client make copy sql to you

IF I SAY I MAKE
THIS MY PRINCIPIAL POSITION
I RUSSIAN
I POSITIVE IF YOU BE MY CLIENT

----------------------------------
" BTC-E.COM"
Prices (Bitcoin):

0.3 BTC - FULL USERDUMP ON BTC-E.COM (850.000+ USERLIST)
- Full dump on Emails, PINS, Usernames and best of all Passwords.

Price BTC - FULLY FUNCTIONALLY BTC-E.COM SOURCECODE + BTC-E DUMP (USERS,PASSWORDS,EMAILS,PINS)
----------------------------------
" BitcoinTalk.org "
Prices (Bitcoin):

0.15 BTC - FULL USERDUMP ON BitcoinTalk.org  (374602 Members+ USERLIST)
- Full dump.sql on Emails, Usernames and best of all Passwords.

Price BTC - BitcoinTalk.org  SOURCECODE
- If you want to buy full source code. Price is 0.15 BTC.

After You Make Payment, send us an e-mail or your Jabber to paybitcoinsqlhacker@Safe-mail.net with what you want and what file download locations and instructions.
When you make the payment, remember to send us an e-mail to paybitcoinsqlhacker@Safe-mail.net
with the amount sent and the wallet address in which you want to receive link to download dump.sql

After you Make Payment You Get My Help 100%
Save Details Transaction And Sent Me For This Specific Mail paybitcoinsqlhacker@Safe-mail.net

N1 Pay [Save Your Details Transaction] Example Test i want to buy full source code. Price is 0.15 BTC.
N2 Contact Me paybitcoinsqlhacker@Safe-mail.net

SQL INJECTION DUMP MEGAPACK
https://bitcointalk.org/index.php?topic=848462.0


December 03, 2014, Theymos receives first DPR subpoena regarding Ulbricht (Silk Road) and the heroin store topic.

This is not very surprising/interesting, but I thought I'd mention that I received a subpoena for information related to Ross Ulbricht's alleged forum account altoid. I mostly just compiled some publicly-available information. The only non-public data I had to include were some deleted posts in the heroin store topic that were not written by DPR and probably won't be useful in the case.

You might be surprised to learn that this is the first subpoena I've received for the forum.

In Silk Road's early days, Ulbricht had posted in a Bitcoin forum promoting the site under his real email, rossulbricht@gmail.com.

May 25, 2015, Bitcointalk server compromised.

On May 22 at 00:56 UTC, an attacker gained root access to the forum's server. He then proceeded to try to acquire a dump of the forum's database before I noticed this at around 1:08 and shut down the server. In the intervening time, it seems that he was able to collect some or all of the "members" table. You should assume that the following information about your account was leaked:
- Email address
- Password hash (see below)
- Last-used IP address and registration IP address
- Secret question and a basic (not brute-force-resistant) hash of your secret answer
- Various settings

As such, you should change your password here and anywhere else you used that same password. You should disable your secret question and assume that the attacker now knows your answer to your secret question. You should prepare to receive phishing emails at your forum email address.

While nothing can ever be ruled out in these sorts of situations, I do not believe that the attacker was able to collect any personal messages or other sensitive data beyond what I listed above.

Passwords are hashed with 7500 rounds of sha256crypt. This is pretty good, but certainly not beyond attack. Note that even though SHA-256 is used here, sha256crypt is different enough from Bitcoin's SHA-256d PoW algorithm that Bitcoin mining ASICs almost certainly cannot be modified to crack forum passwords.

I will now go into detail about how well you can expect your password to fare against a determined attacker. However, regardless of how strong your password is, the only prudent course of action is for you to immediately change your password here and everywhere else you used it or a similar password.

The following table shows how long it will take on average for a rather powerful attacker to recover RANDOM passwords using current technology, depending on the password's alphabet and length. If your password is not completely random (ie. generated with the help of dice or a computer random number generator), then you should assume that your password is already broken.

It is not especially helpful to turn words into leetspeak or put stuff between words. If you have a password like "w0rd71Voc4b", then you should count that as just 2 words to be safe. In reality, your extra stuff will slow an attacker down, but the effect is probably much less than you'd think. Again, the times listed in the table only apply if the words were chosen at random from a word list. If the words are significant in any way, and especially if they form a grammatical sentence or are a quote from a book/webpage/article/etc., then you should consider your password to be broken.

Code:
Estimated time (conservative) for an attacker to break randomly-constructed
bitcointalk.org passwords with current technology

s=second; m=minute; h=hour; d=day; y=year; ky=1000 years; My=1 million years

Password length  a-z  a-zA-Z  a-zA-Z0-9  <all standard>
              8    0      3s        12s              2m
              9    0      2m        13m              3h
             10   8s      2h        13h             13d
             11   3m      5d        34d              1y
             12   1h    261d         3y            260y
             13   1d     37y       366y            22ky
             14  43d   1938y       22ky             1My
             15   1y   100ky        1My           160My
-------------------------------------------------------
         1 word  0
        2 words  0
        3 words  0
        4 words  3m
        5 words  19d
        6 words  405y
        7 words  3My

Each password has its own 12-byte random salt, so it isn't possible to attack more than one password with the same work. If it takes someone 5 days to recover your password, that time will all have to be spent on your password. Therefore, it's likely that only weak passwords will be recovered en masse -- more complicated passwords will be recovered only in targeted attacks against certain people.

If your account is compromised due to this, email acctcomp15@theymos.e4ward.com from the email that was previously associated with your account.

For security reasons, I deleted all drafts. If you need a deleted draft, contact me soon and I can probably give it to you.

A few people might have broken avatars now. Just upload your avatar again to fix it.

Unproxyban fee processing isn't working right now. If you want to register and you can't, get someone to post in Meta for you and you'll be whitelisted.

Searching is temporarily disabled, though it won't be disabled for as long as last time because I improved the reindexing code.

If you changed your password in the short time when the forum was online a little over a day ago, the change didn't stick. You'll have to change it again.

How the compromise happened:

The attacker was able to acquire KVM access credentials for the server. The investigation into how this was possible is still ongoing, so I don't know everything, and I don't yet want to publish everything that I do know, but it seems almost certain that it was a problem on the ISP's end.

After he got KVM access, the attacker convinced the ISP NFOrce that he was me (using his KVM access as part of his evidence) and said that he had locked himself out of the server. So NFOrce reset the server's root password for him, giving him complete access to the server and bypassing most of our carefully-designed security measures. I originally assumed that the attacker gained access entirely via social engineering, but later investigation showed that this was probably only part of the overall attack. As far as I know, NFOrce's overall security practices are no worse than average.

To reduce downtime and avoid temporarily-broken features, I was originally going to stay in NFOrce's data center. However, some things made me suspicious and I moved everything elsewhere. That's where the extra day+ of downtime came from after a short period of uptime. No additional data was leaked.

The forum will pay up to 15 XAU (converted to BTC) for information about the attacker's real-world identity. Exact payment amounts will depend on the quality and usefulness of information as well as what information I've already acquired, but if for example you're the first person to contact me and your info allows me to successfully prosecute this person, then you will get the full 15 XAU. You need to actually convince me that your info is accurate -- just sending me someone's name is useless.

The attacker used the following IPs/email:
37.48.77.227
66.172.27.160
lopaz291@safe-mail.net


A few days later Ross Ulbricht is sentenced to life in prison.
May 29, 2015, Silk Road Founder Ross Ulbricht Sentenced to Life in Prison
https://bitcointalk.org/index.php?topic=1074337.0

Quote from: DarknetMarkets link=topic=1074337.0
Ross William Ulbricht, legendary creator of the original darknet market The Silk Road, has been sentenced today in federal prison to Life in Prison.

Ulbricht became a hero to many in the darknet community, as well as the broader Bitcoin and libertarian movements, after his arrest in November 2013 revealed him to be the ‘Dread Pirate Roberts’, the pseudonymous creator and operator of the Silk Road. His arrest came after a months long investigation by multiple law enforcement departments in the United States.


https://darknetmarkets.org/news/silk-road-founder-ross-ulbricht-sentenced/

Interestingly Ross Ulbrichts email rossulbricht@gmail.com was disclosed in the last hack according to https://haveibeenpwned.com/ (and six other hacks)



https://www.ccn.com/hacked-bitcointalk-org-user-data-goes-up-for-sale-on-dark-web/
Bitcointalk.org Website Defaced Emails And Passwords For Sale

User “DoubleFlag” was selling BitcoinTalk database for BTC 1.0000 (614.67 US Dollar). The database file has 514,408 accounts, each account has a username, email address, personal text number, gender, date of birth, website title and URL, location and password. All passwords are encrypted, to break down in numbers; there are 469,540 passwords that are encrypted with the SHA-256 algorithm and 44,868 passwords encrypted with SMF password encryption.



Quote
Of that number, a minority of 9%, or 44,869 users’ accounts used MD5 hashing with a unique salt for an added layer of security. LeakedSource was able to crack 68% of those users or 30,389 passwords in total.

Notably, the remaining 91% of user passwords were hashed with “sha256crypt”, a method of password storage that LeakedSource deemed as “far superior to nearly every website we’ve seen thus far.” That’s high praise, coming from a resource that reveals details of data breaches frequently, in a time where mega-breaches of hundreds of millions of users are commonplace.
https://www.ccn.com/bitcoin-exchange-btc-e-bitcointalk-forum-breaches-details-revealed/


The forum was also reachable under forum.bitcoin.org for some time before it moved to bitcointalk.org IIRC.
The "name" of the forum is actually "Bitcoin Forum", not "Bitcointalk" (see upper left corner of this page).

Also, it might be noteworthy that for some time, DDOSing this forum coincided with dumps on then dominant Bitcoin exchange MtGox. I.e., you could DDOS this forum, which in turn made the price of Bitcoin drop. Market manipulation wild Wild West Cool

Thank you to taikuri13 for finding additional information.
1976  Economy / Scam Accusations / Re: New scam style. Be careful !!!!!! on: June 02, 2018, 06:06:06 AM
I have posted this thread on begginer & help section. I feel that much helpful for newbie. On the other hand I think this post should be also this board onScam Accusations.That's why I make quote here form my old post. Even we will not able to take any action, but we can aware about that.
Once I check bittrex tweet, I have seen below reply


There is 5000 ETH give away offer. They will ask you to send eth and they will offer you 10X return. Lol.... This not bittrex official Twitter account. Check the spelling they use (Blittrex) instead of Bittrex.
This is a pure scam. Don't send any eth if you see this kind of reply. I have seen almost they make same reply on many exchange's  official tweets. Stay away from this kind of msg. They just make their own fake script. Once you click their link you will see many fake transaction. They will provide a eth address to send eth. And on their script you will see people getting 10X Eth what they send to them. It's totally fake.
There are not any kind of offer like that from any exchange. So be careful & save your money.
Don't click their link.

Anyone stupid enough to send crypto on the promise to get back 10x the amount should not own crypto.

There are so many sophisticated crypto scams that if they fall for such a simple scam they stand no chance of keeping their crypto.

It i really important to educate yourself on crypto safety.

How to avoid getting your exchange account HaCkEd or pHiShEd

Hardware wallets

List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses


1977  Economy / Scam Accusations / Re: Big scam at Waves Decentralized Exchange platform on: June 02, 2018, 05:42:29 AM
I know this is an old thread but hopefully it will be revived! I wanted to take part in the waves airdrop, which looked pretty normal. I went on the Waves platform took screenshots sent them to the support people who verified everything. The next day I went to check my balance and it was all gone except for 0.0009
So I contacted the most likely scam artists support people at Waves and asked why that happened. They sent the usual bulxxxt reasons it could possibly happen and I got the horrible feeling that the whole thing is a scam and there was no hacker getting into my account info.
Instead the hackers were inside people, most likely the creepy guy who replied to all my messages within a minute, highly unusual for any busy real crypto exchange.

STAY AWAY FROM WAVES IT'S A DEFINITE SCAM AND RUN BY THE WAVES PEOPLE THEMSELVES. THEY SHOULD BE LOCKED UP BY TRUMP!!!!!

Waves is not the scam. They are an easy to use DEX and have verified and unverified assets. LPOS also is a great concept.

They are also one of the easiest platforms to make asset tokens on. I know of many valid and useful applications of asset tokens on there.

Unverified bitcoin and ethereum (and other) tokens are a known scam on the waves platform. These scams are run by scammers and not waves.

Anybody can create bitcoin token on the platform - the fraud occurs when the person who made the asset refuses to exchange them back for bitcoin.

Just like with USDT. Tethers are exchanged for US$. The fraud occurs if they refuse to exchange them back.
https://modernconsensus.com/cryptocurrencies/bitcoin/bitfinex-tether-investigation/
1978  Economy / Scam Accusations / Re: Tradesatoshi.com SCAM on: June 02, 2018, 05:08:32 AM
Be aware at what you are trading  on Tradesatoshi.com.
Few days ago i deposited xvg on tradesatosi.com. Xvg had a fork more then 2 weeks ago, other wallets on good exchanges like cryptopia updated the wallet in a matter of few days after the fork, and they blocked withdraws before the fork. Scam satoshi did not blocked the wallet deposit or withdraw, they write with small font wallet maintenance right after a big CAPITAL letter text where it says if you use other adress your coins are lost...
Anyway i try to contact them by support ticket, i got a vague answer that says just to wait. I contacted on discord and they say it is developer fault that did not update the wallet on theyr exchange... and after i insisted to do something and like me started to talk loud other about this issue they banned me.

Be aware if you use this exchange, i have been used him for a while but until now i did not have the badluck to deposit or withdraw a coin that is in maintenance.
God Help us when we will see an wallet updated by them.

Unfortunately coin developers often forget to notify exchanges (especially small exchanges) of forks.

An exchange cannot block deposits. Nobody can block deposits - only withdrawals can be blocked. Withdrawals on the wrong fork can be re-transmitted by the sending wallet on the correct fork.

XVG had a number of forks and security breaches of their coin network recently. When a fork happens it is important to be extra careful when sending coins.

January 21, 2018 Verge Hard Fork at block 1.824,150

April 04, 2018, Network Attack on XVG / VERGE

May 22, 2018, Another Network Attack on XVG / VERGE

hi ModDonnie,
My last access to Tradesatoshi was on 03/15/2018
from that date I never made and I have never authorized or opened this orders


Looks like you got phished. Do you use DYNAMIC 2FA ?
1979  Economy / Scam Accusations / Re: TradeSatoshi.Com - Scam / Fraud | Be Aware! [SOLVED] on: June 02, 2018, 04:53:38 AM
hi ModDonnie,
My last access to Tradesatoshi was on 03/15/2018
from that date I never made and I have never authorized or opened this orders:
Id 5821686   XVG/LTC   Sell   520.29003177   0.00034000   0.00035380   5/16/2018 1:21 PM   false
Id 5821685   XVG/LTC   Sell   88.62820085   0.00034003   0.00006027   5/16/2018 1:21 PM   false
Id 5821684   XVG/LTC   Sell   1000.00000000   0.00035015   0.00070030   5/16/2018 1:21 PM   false
Id 5821683   XVG/LTC   Sell   600.00000000   0.00036010   0.00043212   5/16/2018 1:21 PM   false
Id 5821682   XVG/LTC   Sell   150.10000000   0.00037021   0.00011114   5/16/2018 1:21 PM   false
Id 5821681   XVG/LTC   Sell   168.14499609   0.00038100   0.00012813   5/16/2018 1:21 PM   false
Id 5821680   XVG/LTC   Sell   102.30555628   0.00038101   0.00007796   5/16/2018 1:21 PM   false
Id 5821668   HTML/LTC   Sell   6898.57810414   0.00000406   0.00005602   5/16/2018 1:18 PM   false
Id 5821667   HTML/LTC   Sell   3600.00000000   0.00000408   0.00002938   5/16/2018 1:18 PM   false
Id 5821655   BTCR/LTC   Sell   19835.38445855   0.00000107   0.00004245   5/16/2018 1:17 PM   false

Also I have never authorized the following Withdraw:

Id 335662   LTC   0.9937846 to LhWSgqGxXoThz2u9j7QZGzKnpvgzDeiMK6   5/16/2018 1:31 PM
in fact there are no emails confirming these operations!!!

I ask you to check what I have declared, and if it is true, I ask you the repayment of what was stolen from me...
this problem happened in coincidence with your ad on May 15 2018 ("We are experiencing some problems with our private API.We are working on it.")
Thanks

This is the reply of Tradesatoshi:
Sorry for that. Trade orders can be only handled by users. And for withdrawal we have only process withdrawal when user send request and also confirm withdrawal link by email.
We also aware all users that please enable 2fa for your account security.

Regards
MOD707

Is it normal?I Think too that Tradesatoshi is a SCAM!!!



You probably got phished. How to avoid getting your exchange account HaCkEd or pHiShEd
1980  Economy / Exchanges / How to avoid getting your exchange account HaCkEd or pHiShEd on: June 02, 2018, 03:13:21 AM
Scammers are very sly - can you spot the difference between the real https://www.cryptopia.co.nz  and the fake https://www.cryptopía.co.nz ?
Click on them and see the difference.

Often users think that their accounts are getting hacked or the exchange has been compromised. This is usually not the case. Most of the time users have been the victim of a phishing scam. Some quite basic but often quite sophisticated.


  
Some exchanges do not have a phone app - MOST advertised apps are scams
Be extremely careful clicking links from search engines - popular search engines like Google and Bing have scam sites listed.
Most exchanges do not have a support phone number - phone numbers advertised on third party sites or forums are usually scams
Official Twitter accounts are often spoofed - Make sure the twitter account is REAL and not a scammers CLONE. Differences are often very subtle.
Cryptopia does NOT have 2FA via SMS - this is a scam
Exchanges send emails using their registered domain - anything else is a scam. BinanceSupport@gmail.com is not real.
Also make sure that the email is not spoofed - it may look like the genuine sender. Don't click on links in emails.
BOTs are great but also carry risk - If you use a BOT you may get scammed. Free BOTs are often a scam.
Exchange staff will NEVER ask for your password or 2FA - if you give it to someone you will get scammed
 
The ONLY safe way to resolve a support issue is through a support ticket on the site you have the problem with.
Social media and forum help is unable to be safely verified. - You won't know for sure if they are staff or a scammer.
Social media accounts have been hacked and fake accounts have been verified by twitter.


 


People need to take more security precautions:  
Use google Authenticator or alternative DYNAMIC 2FA.
Use an email account with 2FA enabled and used the highest security settings that is not used for anything other than the exchange.  (gmail or protonmail)
Do not use apps on your phone if you use your phone for Crypto or the crypto email. Scam apps target crypto users.
Other apps on your phone can compromise the security of your phone.
Do not have Crypto wallets on the computer you use for account access.
BEWARE : Some coin personal wallets contain viruses and keystroke loggers that may steal the information from your computer.
Have a firewall, anti virus and anti malware from a reputable provider.
Do not click on links from seach engines or other sites to go to your exchange.
Always check the site security certificate.
Do not use bots unless you are 100% certain the bot is safe. Limit bot access to your funds by having multiple accounts. Most advertised bots are scams and will steal your crypto. Only get your bot from a reputable vendor.
Avoid WIFI - public wifi and unsecured WIFI is very unsafe. All WIFI is vulnerable.
Do not log onto and exchange with computers you don't own or have full control over.
NEVER EVER give your password or 2FA to someone else.
Use different email addresses and different passwords for different exchanges.



Scammers are now using DODGY security certificates. Make sure the security certificate is from the correct certifier.
 
TROJAN ALERT: https://www.bleepingcomputer.com/news/security/evrial-trojan-switches-bitcoin-addresses-copied-to-windows-clipboard/ is a trojan virus which changes any cryptocurrency address that is on your clipboard to a different address - ALWAYS take care to ensure the address that has been entered is the one you're intending to send to.


  
Using a pin for 2FA is not recommended. It is easy for a hacker to use a keystroke logger on your computer to gain access to your password and pincode.
Some recent coin wallets have had keystroke loggers and viruses built into them. For this reason you should never have coinwallets on the computer you use to access an exchange.
 

 
An exchange has no way of identifying a thief if they use valid logon credentials. It is like when your bank card AND PIN have been stolen - the ATM or bank is not at fault.
If you visit a scam site that looks like your exchange you are giving the scammer your email address, password and 2FA
That is not hacking - it is known as phishing. The exchange has no way of knowing that a scammer has all your VALID login cerdentials because YOU have accidentally given it to them.
For this reason you should take extreme care in keeping your logon credentials safe. For extra security use a unique email address that you only use for only one exchange. Have 2FA enabled on that email addres as well. SMS reset or SMS for 2FA is not particularly safe.


 
https://haveibeenpwned.com/ You can check here if your email address has been compromised by a previous hack.
Unfortunately if your account has been phished the scammers remove the funds within a few minutes. (Unless your withdrawal limit prevents them for doing this). All phishing attacks should be reported to the police.
 

https://chrome.google.com/webstore/detail/metamask/nkbihfbeogaeaoehlefnkodbefgpgknn  Metamask chrome (also available for firefox) can warn you about phishing sites.
 
IMPORTANT: If your email has been hacked or you have been phished please make a support ticket immediately. Change your password and 2FA immediately on your exchange account AND your change the email address you use for the exchange.
 
A great 'one stop shop' for everything you need to ensure your account has security wise:



EDIT: Added image:



Source:
Scammers spoofing cryptocurrency exchanges
My earlier post on another forum
Pages: « 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 [99] 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!