Bitcoin Forum
November 12, 2024, 07:44:02 AM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3]  All
  Print  
Author Topic: Question about wallet hacking  (Read 3320 times)
varChar
Member
**
Offline Offline

Activity: 92
Merit: 10


View Profile
April 05, 2014, 08:27:34 AM
 #41

OT: Read in this post about the wallet stealer. Even if this guy lost it that way or if someone else loose it like that. The hacker still needs the password doesn't he?
dowsey14
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
April 05, 2014, 09:58:06 AM
 #42

OT: Read in this post about the wallet stealer. Even if this guy lost it that way or if someone else loose it like that. The hacker still needs the password doesn't he?

Of course, they need the passphrase.

However, if they dumped a keylogger onto the system, then the keylogger would be able to pick up the passphrase and redirect the logged keys to a remote PC and allow the person on that PC to then access the encrypted wallet and therefore they would be able to lift the keys from the wallet and drain the funds from those keys...

...the person who had funds at those keys would then lose their bitcoins because they would be moved to a new address by the person who managed to obtain a copy of the wallet and the passphrase. The other person would then control the coins from that point on.

You only need the private key to a bitcoin address to take the funds from that address. Since the private key allows one to spend the coins at that address, if you were to obtain the private key to another person's bitcoin address you would have to perform a transaction to your own bitcoin address in order to steal them (and of course keep it's corresponding private key - or else you couldn't access the coins yourself).
zolace
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


View Profile
April 05, 2014, 07:17:40 PM
 #43

Thankfully, such attacks are rarer than that. But given the size of the bitcoin economy, they are still far, far more common than they have any right to be. A look at the history of bitcoin hacks is a look at the history of bitcoin itself, from its beginnings all the way to the genesis of the professionalised second generation of firms we’re seeing now

⚂⚄ Pocket Dice — Real dice experienceProvably Fair
Free BTC Faucet
⚅⚁
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
flik68 (OP)
Newbie
*
Offline Offline

Activity: 12
Merit: 0


View Profile
April 11, 2014, 06:42:45 AM
 #44

OT: Read in this post about the wallet stealer. Even if this guy lost it that way or if someone else loose it like that. The hacker still needs the password doesn't he?

Of course, they need the passphrase.

However, if they dumped a keylogger onto the system, then the keylogger would be able to pick up the passphrase and redirect the logged keys to a remote PC and allow the person on that PC to then access the encrypted wallet and therefore they would be able to lift the keys from the wallet and drain the funds from those keys...

...the person who had funds at those keys would then lose their bitcoins because they would be moved to a new address by the person who managed to obtain a copy of the wallet and the passphrase. The other person would then control the coins from that point on.

You only need the private key to a bitcoin address to take the funds from that address. Since the private key allows one to spend the coins at that address, if you were to obtain the private key to another person's bitcoin address you would have to perform a transaction to your own bitcoin address in order to steal them (and of course keep it's corresponding private key - or else you couldn't access the coins yourself).

As already stated above, no keylogger was found after an indepth forensic audit of the machine used for that wallet. No malware either. And that same machine was used for other wallets as well, yet they were/are untouched and their coins still there. (they were all immediately resecured and liquidated for cash) And the machine was never used for browsing or anything else. It was a dedicated machine, on a dedicated isp connection whose singular purpose for bitcoin management. It did not travel, it did not connect to wifi connections in coffee shops...
Pages: « 1 2 [3]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!