Bitcoin Forum
May 05, 2024, 07:17:35 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: VNC TO STEAL BITCOIN CLIENT BALANCE?  (Read 889 times)
zurzon (OP)
Newbie
*
Offline Offline

Activity: 14
Merit: 0



View Profile
June 14, 2011, 09:57:42 PM
 #1

Somebody reported that their bitcoin balance in their client had been stolen and sent to an anonymous address.

I don't remember what thread that was, so don't suggest posting in that thread as some trolling thread cop would.

It occurred to me that it would be possible to steal somebody's balance with a VNC connection to somebody's computer.

I was playing around with TightVNC and had it installed on my computer and running as a server, when somebody from Canada tried to access my computer using their TightVNC client.

What amazed me was they didn't need a password and username.

I think it was a back door in the software.

I blocked the access attempt with my firewall software, and after that, I removed the VNC software.

If the firewall hadn't been in place, who ever it was would have gained access to my computer.

If he had, it would have been a simple matter for him to access my bitcoin client and send my entire balance to his payment address.
1714936655
Hero Member
*
Offline Offline

Posts: 1714936655

View Profile Personal Message (Offline)

Ignore
1714936655
Reply with quote  #2

1714936655
Report to moderator
1714936655
Hero Member
*
Offline Offline

Posts: 1714936655

View Profile Personal Message (Offline)

Ignore
1714936655
Reply with quote  #2

1714936655
Report to moderator
"Bitcoin: mining our own business since 2009" -- Pieter Wuille
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714936655
Hero Member
*
Offline Offline

Posts: 1714936655

View Profile Personal Message (Offline)

Ignore
1714936655
Reply with quote  #2

1714936655
Report to moderator
1714936655
Hero Member
*
Offline Offline

Posts: 1714936655

View Profile Personal Message (Offline)

Ignore
1714936655
Reply with quote  #2

1714936655
Report to moderator
lysol
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile WWW
June 14, 2011, 10:05:43 PM
 #2

Since you blocked the connection at your software firewall level, I'd say they didn't even get to the password stage. There are plenty of people/bots/scripts that scan ranges of addresses for open SSH, VNC, etc. I doubt it was anything targeted at you specifically.
zurzon (OP)
Newbie
*
Offline Offline

Activity: 14
Merit: 0



View Profile
June 14, 2011, 10:18:22 PM
 #3

Since you blocked the connection at your software firewall level, I'd say they didn't even get to the password stage. There are plenty of people/bots/scripts that scan ranges of addresses for open SSH, VNC, etc. I doubt it was anything targeted at you specifically.

Possibly.
lysol
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile WWW
June 14, 2011, 10:30:53 PM
 #4

The simplest explanation is most likely true. Since your software firewall stopped anything from happening on the connection right after the TCP handshake, it isn't possible that the VNC handshake even took place. Unless your software firewall is exceptionally strange.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!