Bitcoin Forum
May 11, 2024, 08:05:35 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 4 »  All
  Print  
Author Topic: Bitcoin maleabity attack - who made it and is it still running?  (Read 3826 times)
forzendiablo (OP)
Legendary
*
Offline Offline

Activity: 1526
Merit: 1000


the grandpa of cryptos


View Profile
October 06, 2015, 06:16:21 PM
 #1

i read somewhere that somebody said its him doing the attack yet i cannot find this post.

so my questio nis - who did this attack and is it still running?

yolo
1715414735
Hero Member
*
Offline Offline

Posts: 1715414735

View Profile Personal Message (Offline)

Ignore
1715414735
Reply with quote  #2

1715414735
Report to moderator
Make sure you back up your wallet regularly! Unlike a bank account, nobody can help you if you lose access to your BTC.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715414735
Hero Member
*
Offline Offline

Posts: 1715414735

View Profile Personal Message (Offline)

Ignore
1715414735
Reply with quote  #2

1715414735
Report to moderator
1715414735
Hero Member
*
Offline Offline

Posts: 1715414735

View Profile Personal Message (Offline)

Ignore
1715414735
Reply with quote  #2

1715414735
Report to moderator
EthanB
Sr. Member
****
Offline Offline

Activity: 462
Merit: 336


View Profile
October 06, 2015, 06:18:19 PM
 #2

Anybody with a little bit of programming/bitcoin knowledge can easily perform this; hence there are many people doing it in an attempt to force improvement through the bitcoin network because it has already proven to be detrimental.
It is still occurring.
dothebeats
Legendary
*
Offline Offline

Activity: 3640
Merit: 1352


Cashback 15%


View Profile
October 06, 2015, 06:25:40 PM
 #3

It is still ongoing as of this moment, and the certain user who performed it is this one: https://bitcointalk.org/index.php?action=profile;u=197593

You can find the thread regarding the attack here: https://bitcointalk.org/index.php?topic=1198032.0

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Kprawn
Legendary
*
Offline Offline

Activity: 1904
Merit: 1073


View Profile
October 06, 2015, 06:50:14 PM
 #4

I find it strange that all these technical loopholes have been found recently, and not a lot before that. I wonder how all of this fits into the Bitcoin Core vs Bitcoin XT debate.

It's pure speculation, but things has gone crazy, since this whole split has happened. The person doing this malleability attack has a lot of technical information of the inner

workings of Bitcoin, so it's probably a engineer or a developer? 

THE FIRST DECENTRALIZED & PLAYER-OWNED CASINO
.EARNBET..EARN BITCOIN: DIVIDENDS
FOR-LIFETIME & MUCH MORE.
. BET WITH: BTCETHEOSLTCBCHWAXXRPBNB
.JOIN US: GITLABTWITTERTELEGRAM
dothebeats
Legendary
*
Offline Offline

Activity: 3640
Merit: 1352


Cashback 15%


View Profile
October 06, 2015, 06:52:36 PM
 #5

I find it strange that all these technical loopholes have been found recently, and not a lot before that. I wonder how all of this fits into the Bitcoin Core vs Bitcoin XT debate.

It's pure speculation, but things has gone crazy, since this whole split has happened. The person doing this malleability attack has a lot of technical information of the inner

workings of Bitcoin, so it's probably a engineer or a developer? 

Check the user that I've just linked to here and also read the whole thread that I've just linked. The user claims that he doesn't use bitcoins and as I see it, is a pro-bankster. Cool, right? He seems to have a lot of knowledge regarding that certain attack vector on bitcoin.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
EthanB
Sr. Member
****
Offline Offline

Activity: 462
Merit: 336


View Profile
October 06, 2015, 06:56:26 PM
 #6

I find it strange that all these technical loopholes have been found recently, and not a lot before that. I wonder how all of this fits into the Bitcoin Core vs Bitcoin XT debate.

It's pure speculation, but things has gone crazy, since this whole split has happened. The person doing this malleability attack has a lot of technical information of the inner

workings of Bitcoin, so it's probably a engineer or a developer? 

Bitcoin has been growing extremely rapidly the past few years, and this brings a lot more pressure to any faults and flaws within the code.
More eyes and more incentive these days.
Mickeyb
Hero Member
*****
Offline Offline

Activity: 798
Merit: 1000

Move On !!!!!!


View Profile
October 06, 2015, 09:07:15 PM
 #7

I find it strange that all these technical loopholes have been found recently, and not a lot before that. I wonder how all of this fits into the Bitcoin Core vs Bitcoin XT debate.

It's pure speculation, but things has gone crazy, since this whole split has happened. The person doing this malleability attack has a lot of technical information of the inner

workings of Bitcoin, so it's probably a engineer or a developer? 

Isn't this the same old transaction malleability that has already happened last year? Markets have then reacted much wilder and we have seen major drops in price. I thought this is the same old problem.

As I know a BIP 62 is here to solve this problem but this BIP 62 still hasn't been finished and deployed successfully!
celebreze32
Sr. Member
****
Offline Offline

Activity: 296
Merit: 250


View Profile
October 06, 2015, 09:21:04 PM
 #8

The attacker can't steal your money. All the attacker can do is change your transaction ID, then re-transmit it very quickly to send Bitcoins to the same address they were originally intended to be sent to. One of the transaction IDs has to be accepted by the network,and the other has to be discarded. Your Bitcoins still get sent to the address they were intended to go to, but sometimes they arrive with a different transaction ID than you were expecting if your transaction gets attacked.
twister
Hero Member
*****
Offline Offline

Activity: 672
Merit: 501



View Profile WWW
October 07, 2015, 01:03:50 PM
 #9

The attacker can't steal your money. All the attacker can do is change your transaction ID, then re-transmit it very quickly to send Bitcoins to the same address they were originally intended to be sent to. One of the transaction IDs has to be accepted by the network,and the other has to be discarded. Your Bitcoins still get sent to the address they were intended to go to, but sometimes they arrive with a different transaction ID than you were expecting if your transaction gets attacked.

Yes that's all they can do but it affects certain transaction which rely on the transaction ID, for example if you're live betting and you send in a bet, it gets accepted but then the other one is sent with different ID and the 2nd one gets confirmed and by that time the odds have changed, one other affect of it is, someone I know reloads his mobile using BTC, so he sended the BTC and waited but never received his reload because his transaction under original ID was never confirmed and the other one did but the website didn't recognize that as it relies on the Tx ID.

And OP it is still going on, I did many transactions today and couple of those were resent using different ID and thankfully it didn't affected anything, other than the Blockchain.info warning saying that this address has double spends.

 

██████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████
 
Get Free Bitcoin Now!
  ¦¯¦¦¯¦    ¦¯¦¦¯¦    ¦¯¦¦¯¦    ¦¯¦¦¯¦   
0.8%-1% House Edge
[/
Q7
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250


View Profile WWW
October 07, 2015, 01:15:09 PM
 #10

From what I can see, it's somebody who is out to destroy bitcoin. What is there to gain by carrying out the attack only to cause inconvenience to the users. Obviously it is the trust and reputation factor that is at risk here because people see bitcoin as a reliable payment system. I'm also surprised that after so many years there is still loophole in the system that can be exploited.

tl121
Sr. Member
****
Offline Offline

Activity: 278
Merit: 252


View Profile
October 07, 2015, 04:34:22 PM
 #11

From what I can see, it's somebody who is out to destroy bitcoin. What is there to gain by carrying out the attack only to cause inconvenience to the users. Obviously it is the trust and reputation factor that is at risk here because people see bitcoin as a reliable payment system. I'm also surprised that after so many years there is still loophole in the system that can be exploited.

The problem is that a known bug in the bitcoin protocol has festered for years.  If the "core" developers had been doing their job, this problem would have been fixed long ago.

amaclin
Legendary
*
Offline Offline

Activity: 1260
Merit: 1019


View Profile
October 07, 2015, 04:48:39 PM
 #12

Check the user that I've just linked to here and also read the whole thread that I've just linked.
The user claims that he doesn't use bitcoins and as I see it, is a pro-bankster.
Cool, right? He seems to have a lot of knowledge regarding that certain attack vector on bitcoin.

1) I use bitcoins. But I do not hold them. Sorry for some misunderstanding. My English is not perfect.
Let me give an example:
I eat watermelons. But I do not buy watermelons for investing.
Because I do not think that I would be able to sell the watermelon tomorrow with profit.
And I advise to everyone not to invest and hodl watermelons.

2) I am not pro-bankster.
I just say, that keeping money in pockets is better than investing in watermelons
unamis76
Legendary
*
Offline Offline

Activity: 1512
Merit: 1009


View Profile
October 07, 2015, 06:17:51 PM
 #13

You can check if it's still running here, on the third graph
maokoto
Hero Member
*****
Offline Offline

Activity: 770
Merit: 500


✪ NEXCHANGE | BTC, LTC, ETH & DOGE ✪


View Profile WWW
October 07, 2015, 06:38:42 PM
 #14

Some scam sites have taken advantage of this attack as an excuse to dissappear/lost deposits/lost withdrawals. Been a hard week for some.

christycalhoun
Sr. Member
****
Offline Offline

Activity: 378
Merit: 250


View Profile
October 07, 2015, 07:16:30 PM
 #15

Would there be a way for the attacker to use this explout to steal bitcoins from people? I am not an expert on this stuff.

gmaxwell
Staff
Legendary
*
Offline Offline

Activity: 4172
Merit: 8419



View Profile WWW
October 07, 2015, 07:35:08 PM
 #16

The problem is that a known bug in the bitcoin protocol has festered for years.  If the "core" developers had been doing their job, this problem would have been fixed long ago.
There are a dozen different malleability vectors in the protocol as originally designed; some are quite useful and important intentional features-- others are not.  Though the harm from malleability is very moderate-- and because of the intentional features and the potential for ordinary double spends, wallets must have basically sane handling for it--, unwanted third party malleability is a nuisance. In Bitcoin Core's wallet the nuisance can be greatly mitigated by setting spendzeroconfchange=0.

Because of it being a nuisance all of vectors for malleability except for one were blocked as non-standard transactions in Bitcoin Core years ago.  The remaining one could not be simply blocked because it requires transactions to confine their signatures to a particular form-- low-S-- and all software was violating before the issue was known.  Because of this applying that final constraint would have blocked almost all transactions on the network-- something not justified for a nuisance level attack. Bitcoin Core changed constrain its own transactions to this form in 2013 but it has taken a long time for other software to update themselves. Fortunately, the final remaining type of malleability was ever so slightly trickier to exploit, so people haven't been doing so at scale. In the meantime a proposal was made, as part of BIP62, for a v3 transaction type where parties creating transactions could opt into the protective behavior if they were recent enough to support it. Unfortunately BIP62 is fairly complex and no one outside of a small group of contributors to Bitcoin Core have cared at all about advancing it.  So we've been breaking up parts of them and applying them to the consensus incrementally (e.g. BIP66).

Current git master Bitcoin Core enforces the requirement for all transactions it relays or mines, once this is in a release and widely deployed it will end this irritation; but it will also block most transactions from small portion of the network on software which is out of date or hasn't been updated to produces anti-malleability-friendly low-S signatures (on the order of 5% of all transactions now; due to ongoing efforts to harass parties to fix their wallet software).

I've called for assistance several times in identifying the origin of a list of lowS violating transactions in order to help speed deployment of this, but it seems that the Bitcoin community is a lot more interested in whining and throwing blame then stepping up and doing a little bit of the non-development work needed to get this deployed. Sad
Mickeyb
Hero Member
*****
Offline Offline

Activity: 798
Merit: 1000

Move On !!!!!!


View Profile
October 07, 2015, 08:56:28 PM
 #17

Would there be a way for the attacker to use this explout to steal bitcoins from people? I am not an expert on this stuff.

No I don't think so. Only a great danger of double spending as far as I know!
tl121
Sr. Member
****
Offline Offline

Activity: 278
Merit: 252


View Profile
October 07, 2015, 09:38:24 PM
 #18

The problem is that a known bug in the bitcoin protocol has festered for years.  If the "core" developers had been doing their job, this problem would have been fixed long ago.
There are a dozen different malleability vectors in the protocol as originally designed; some are quite useful and important intentional features-- others are not.  Though the harm from malleability is very moderate-- and because of the intentional features and the potential for ordinary double spends, wallets must have basically sane handling for it--, unwanted third party malleability is a nuisance. In Bitcoin Core's wallet the nuisance can be greatly mitigated by setting spendzeroconfchange=0.

Because of it being a nuisance all of vectors for malleability except for one were blocked as non-standard transactions in Bitcoin Core years ago.  The remaining one could not be simply blocked because it requires transactions to confine their signatures to a particular form-- low-S-- and all software was violating before the issue was known.  Because of this applying that final constraint would have blocked almost all transactions on the network-- something not justified for a nuisance level attack. Bitcoin Core changed constrain its own transactions to this form in 2013 but it has taken a long time for other software to update themselves. Fortunately, the final remaining type of malleability was ever so slightly trickier to exploit, so people haven't been doing so at scale. In the meantime a proposal was made, as part of BIP62, for a v3 transaction type where parties creating transactions could opt into the protective behavior if they were recent enough to support it. Unfortunately BIP62 is fairly complex and no one outside of a small group of contributors to Bitcoin Core have cared at all about advancing it.  So we've been breaking up parts of them and applying them to the consensus incrementally (e.g. BIP66).

Current git master Bitcoin Core enforces the requirement for all transactions it relays or mines, once this is in a release and widely deployed it will end this irritation; but it will also block most transactions from small portion of the network on software which is out of date or hasn't been updated to produces anti-malleability-friendly low-S signatures (on the order of 5% of all transactions now; due to ongoing efforts to harass parties to fix their wallet software).

I've called for assistance several times in identifying the origin of a list of lowS violating transactions in order to help speed deployment of this, but it seems that the Bitcoin community is a lot more interested in whining and throwing blame then stepping up and doing a little bit of the non-development work needed to get this deployed. Sad

Please explain (or reference an explanation) as to why malleability features would be quite useful.

Also, I would like to understand why people care about old implementations that aren't being actively maintained by people who are following bitcoin.  Please explain why it matters what happens to these old implementations?  Why should you or anyone else waste effort to dig up these issues?
knowhow
Hero Member
*****
Offline Offline

Activity: 560
Merit: 500


View Profile
October 07, 2015, 09:42:32 PM
 #19

Those attack can be anyone from credit cards companys ,google or any person with huge skills trying to get into the team of bitcoin,we will never know why and who are attacking it,to destroy well if there is a hole to attack the team should be working in something to close it before too late,i cant imagine bitcoin being hacked and controlled by some hacker..... destroying all crypto instantly.
amaclin
Legendary
*
Offline Offline

Activity: 1260
Merit: 1019


View Profile
October 07, 2015, 09:47:57 PM
 #20

we will never know why and who are attacking it
never say never.
it was me behind this particular stress-test
i am not from bank company and do not work for google
Pages: [1] 2 3 4 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!