Bitcoin Forum
May 24, 2024, 10:37:51 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they strongly believe that the creator of this topic is a scammer. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: « 1 [2]  All
  Print  
Author Topic: Blockchain.info isn't safe - My Wallet Password Stealer (Passes the "Verifier")  (Read 29985 times)
molecular
Donator
Legendary
*
Offline Offline

Activity: 2772
Merit: 1019



View Profile
December 25, 2012, 09:05:52 AM
 #21

@OP: can you explain more precisely what you did?

He looked into his own system memory and was amazed to discover stuff.  Roll Eyes

In his last post he said he managed to make a browser plugin that was able to read the pw when user entered it on blockchain.info. That would be a serious threat.

That's how it's supposed to work. When you open a Blockchain wallet, you're opening it in your own computer RAM. Your own browser is going to read at your own password, because he needs it to decrypt your wallet in the memory. Yes, there's a vulnerability when you type your password and use it to decrypt your wallet, since you can intercept the password at that moment (using a keylogger or any malicious software). But it's nothing new, that vulnerability always existed. If you use the official Bitcoin software and type your password to decrypt your wallet, you have the same vulnerability. Your password is going to exist in a decrypted form in your system memory at a point in time. We consider the risk acceptable simply because RAM is so volatile.

The difference between blockchain.info and other online wallets is that the point of failure is at each user computer, instead of being the server itself.

tl;dr
TradeFortress is trolling.

He might be trolling, but he's not saying: "I found blockchain pw in my memory". He's saying: "I can write an extension that will send me the pw if installed in the browser by someone". That's a big difference. It's not exceptionally hard to make a browser extension that will be installed by many bitcoiners. Up until now I thought it'd be hard to make one that send the blockchain.info pw home. I'm not so sure any more.


PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0  3F39 FC49 2362 F9B7 0769
John (John K.)
Global Troll-buster and
Legendary
*
Offline Offline

Activity: 1288
Merit: 1226


Away on an extended break


View Profile
December 25, 2012, 09:18:16 AM
 #22

@OP: can you explain more precisely what you did?

He looked into his own system memory and was amazed to discover stuff.  Roll Eyes

In his last post he said he managed to make a browser plugin that was able to read the pw when user entered it on blockchain.info. That would be a serious threat.

That's how it's supposed to work. When you open a Blockchain wallet, you're opening it in your own computer RAM. Your own browser is going to read at your own password, because he needs it to decrypt your wallet in the memory. Yes, there's a vulnerability when you type your password and use it to decrypt your wallet, since you can intercept the password at that moment (using a keylogger or any malicious software). But it's nothing new, that vulnerability always existed. If you use the official Bitcoin software and type your password to decrypt your wallet, you have the same vulnerability. Your password is going to exist in a decrypted form in your system memory at a point in time. We consider the risk acceptable simply because RAM is so volatile.

The difference between blockchain.info and other online wallets is that the point of failure is at each user computer, instead of being the server itself.

tl;dr
TradeFortress is trolling.

He might be trolling, but he's not saying: "I found blockchain pw in my memory". He's saying: "I can write an extension that will send me the pw if installed in the browser by someone". That's a big difference. It's not exceptionally hard to make a browser extension that will be installed by many bitcoiners. Up until now I thought it'd be hard to make one that send the blockchain.info pw home. I'm not so sure any more.


Well, I'm not too sure about the difference between someone writing a keylogger and sending the password home and writing a malicious extension to send the password home.
davout
Legendary
*
Offline Offline

Activity: 1372
Merit: 1007


1davout


View Profile WWW
December 25, 2012, 09:42:11 AM
 #23

These points are moot since its extremely easy to protect your blockchain.info wallet with  a yubikey. oh. no. wait a second, the yubikey otp check is done in horribly wrong and broken ways and only checks the key id, not the actual otp.

Replay attacks ? Go for it !

Jaw3bmasters
Full Member
***
Offline Offline

Activity: 196
Merit: 100


Another block in the wall


View Profile
December 25, 2012, 09:50:55 AM
 #24

@OP: can you explain more precisely what you did?

He looked into his own system memory and was amazed to discover stuff.  Roll Eyes

In his last post he said he managed to make a browser plugin that was able to read the pw when user entered it on blockchain.info. That would be a serious threat.

That's how it's supposed to work. When you open a Blockchain wallet, you're opening it in your own computer RAM. Your own browser is going to read at your own password, because he needs it to decrypt your wallet in the memory. Yes, there's a vulnerability when you type your password and use it to decrypt your wallet, since you can intercept the password at that moment (using a keylogger or any malicious software). But it's nothing new, that vulnerability always existed. If you use the official Bitcoin software and type your password to decrypt your wallet, you have the same vulnerability. Your password is going to exist in a decrypted form in your system memory at a point in time. We consider the risk acceptable simply because RAM is so volatile.

The difference between blockchain.info and other online wallets is that the point of failure is at each user computer, instead of being the server itself.

tl;dr
TradeFortress is trolling.

He might be trolling, but he's not saying: "I found blockchain pw in my memory". He's saying: "I can write an extension that will send me the pw if installed in the browser by someone". That's a big difference. It's not exceptionally hard to make a browser extension that will be installed by many bitcoiners. Up until now I thought it'd be hard to make one that send the blockchain.info pw home. I'm not so sure any more.


Well, I'm not too sure about the difference between someone writing a keylogger and sending the password home and writing a malicious extension to send the password home.

One is easier to install.

In Cryptography we trust.
flatfly
Legendary
*
Offline Offline

Activity: 1078
Merit: 1016

760930


View Profile
December 25, 2012, 10:02:31 AM
Last edit: December 25, 2012, 10:13:54 AM by flatfly
 #25

One problem with malicious browser extensions is that they are usually not checked by antivirus software for evil behavior and provide an attacker with easy access to all OSes simultaneously.

That said, piuk is right when saying that end-users should ultimately be responsible for securing their own computers.
jago25_98
Hero Member
*****
Offline Offline

Activity: 900
Merit: 1000


Crypto Geek


View Profile WWW
December 27, 2012, 03:39:15 PM
 #26

OK folks.

So...
 look at what extensions and addons you have installed...
 potentially any of those extensions have access to your wallet.

Thanks for the proof of concept. I hope it can be improved.

This has already been a worry of mine. Chrome extensions especially are very low hanging fruit for a carte-blanche rouge code in the same way phone apps are.

As a minimum I will be watching what I install more, going only for open source extensions methinks. Though this is no real protection it's the most practical I can think of for now.

Bitcoiner since the early days. Crypto YouTube Channel: Trading Nomads | Analyst | News Reporter | Bitcoin Hodler | Support Freedom of Speech!
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!