Bitcoin Forum
May 06, 2024, 01:31:09 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 [5]  All
  Print  
Author Topic: How I got robbed of 34 btc on Mt.Gox today  (Read 124824 times)
Herodes
Hero Member
*****
Offline Offline

Activity: 868
Merit: 1000


View Profile
April 15, 2013, 07:04:26 AM
 #81

You are not a noob. Obviously you know what 2-factor authorization is and you are lazy enough not to use it. How could you blame MtGox and even ask for any compensation?

Conceivably, an exploit like this could lie in wait until you use two-factor and then hijack your existing session to do whatever.  While the OP did, IMO, screw up, Gox has some responsibility to monitor their own computers.

what could gox've done ?
"With e-currency based on cryptographic proof, without the need to trust a third party middleman, money can be secure and transactions effortless." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714959069
Hero Member
*
Offline Offline

Posts: 1714959069

View Profile Personal Message (Offline)

Ignore
1714959069
Reply with quote  #2

1714959069
Report to moderator
1714959069
Hero Member
*
Offline Offline

Posts: 1714959069

View Profile Personal Message (Offline)

Ignore
1714959069
Reply with quote  #2

1714959069
Report to moderator
1714959069
Hero Member
*
Offline Offline

Posts: 1714959069

View Profile Personal Message (Offline)

Ignore
1714959069
Reply with quote  #2

1714959069
Report to moderator
Raoul Duke
aka psy
Legendary
*
Offline Offline

Activity: 1358
Merit: 1002



View Profile
April 15, 2013, 10:15:48 AM
 #82

You are not a noob. Obviously you know what 2-factor authorization is and you are lazy enough not to use it. How could you blame MtGox and even ask for any compensation?

Conceivably, an exploit like this could lie in wait until you use two-factor and then hijack your existing session to do whatever.  While the OP did, IMO, screw up, Gox has some responsibility to monitor their own computers.

what could gox've done ?

I don't know, maybe they could just block everyone who logs in to MtGox with correct credentials, that would show those hackers who's the boss Roll Eyes
darkmule
Legendary
*
Offline Offline

Activity: 1176
Merit: 1005



View Profile
April 15, 2013, 08:24:41 PM
 #83

what could gox've done ?

They could have been a bit quicker deleting an obviously bogus and malicious link from their own chat.
deepceleron
Legendary
*
Offline Offline

Activity: 1512
Merit: 1028



View Profile WWW
April 15, 2013, 11:17:42 PM
 #84

what could gox've done ?

They could have been a bit quicker deleting an obviously bogus and malicious link from their own chat.
It was a link in the btc-e chat. It could as easily have been a link posted here.

What could limit the success of these attacks besides 2FA would be if mtgox would lock changes to withdraw address or account details for 24 hours and send an email of the activity.
darkmule
Legendary
*
Offline Offline

Activity: 1176
Merit: 1005



View Profile
April 16, 2013, 03:09:31 AM
 #85

It was a link in the btc-e chat. It could as easily have been a link posted here.

What could limit the success of these attacks besides 2FA would be if mtgox would lock changes to withdraw address or account details for 24 hours and send an email of the activity.

I stand corrected.  The OP did state it was a link in btc-e chat, and I misremembered.
biganth
Full Member
***
Offline Offline

Activity: 210
Merit: 100



View Profile
April 17, 2013, 02:30:07 AM
 #86

The exploit took advantage of the fact that he was already logged in, so even if he was using 2f how could this have helped unless Mt. Gox requires 2f again when you perform a withdrawal.

jl2012
Legendary
*
Offline Offline

Activity: 1792
Merit: 1093


View Profile
April 17, 2013, 02:33:27 AM
 #87

The exploit took advantage of the fact that he was already logged in, so even if he was using 2f how could this have helped unless Mt. Gox requires 2f again when you perform a withdrawal.

Every Mt. Gox 2f user knows Mt. Gox requires 2f again when a withdrawal is performed  Roll Eyes

Donation address: 374iXxS4BuqFHsEwwxUuH3nvJ69Y7Hqur3 (Bitcoin ONLY)
LRDGENPLYrcTRssGoZrsCT1hngaH3BVkM4 (LTC)
PGP: D3CC 1772 8600 5BB8 FF67 3294 C524 2A1A B393 6517
biganth
Full Member
***
Offline Offline

Activity: 210
Merit: 100



View Profile
April 17, 2013, 02:39:30 AM
 #88

Every Mt. Gox 2f user knows Mt. Gox requires 2f again when a withdrawal is performed  Roll Eyes

Thanks, I'm not a Mt. Gox user and I didn't know.

Rampion
Legendary
*
Offline Offline

Activity: 1148
Merit: 1018


View Profile
April 17, 2013, 10:05:26 AM
 #89

Every Mt. Gox 2f user knows Mt. Gox requires 2f again when a withdrawal is performed  Roll Eyes

Thanks, I'm not a Mt. Gox user and I didn't know.

Well, the whole point of 2fa is that you need a ONE TIME PASSWORD that changes every few seconds. You don't need to be a MtGox user to know that, because that's how OTP and 2FA works everywhere.

bitbully (OP)
Jr. Member
*
Offline Offline

Activity: 47
Merit: 1


View Profile
April 21, 2013, 02:32:40 AM
Last edit: April 21, 2013, 02:47:19 AM by bitbully
 #90

Here's some proof for you Poutine.

"I am moverstar and I am legit."
Malawi
Full Member
***
Offline Offline

Activity: 224
Merit: 100


One bitcoin to rule them all!


View Profile
April 21, 2013, 03:01:00 AM
 #91

Seems like MtGox need to start using some form of email-verification before the transaction to other accounts/out of MtGox actually happens.

BitCoin is NOT a pyramid - it's a pagoda.
ninjaboon
Legendary
*
Offline Offline

Activity: 2114
Merit: 1002



View Profile WWW
April 21, 2013, 06:59:20 AM
 #92

Or A LOT of people is in deep shit.
Anyhow: 2 Factor Authentification is a must.
++11

crazy_rabbit
Legendary
*
Offline Offline

Activity: 1204
Merit: 1001


RUM AND CARROTS: A PIRATE LIFE FOR ME


View Profile
April 21, 2013, 07:34:23 AM
 #93

Seems like MtGox need to start using some form of email-verification before the transaction to other accounts/out of MtGox actually happens.

Huh
How about people stop being cheap and just buy a yubikey. Is $30 (or however much it costs) too expensive to protect your money? Email verification pales in comparison to having a physical hardware token. Come on people,  stop being cheap and just buy the thing!

more or less retired.
Rampion
Legendary
*
Offline Offline

Activity: 1148
Merit: 1018


View Profile
April 21, 2013, 11:07:53 AM
 #94

Seems like MtGox need to start using some form of email-verification before the transaction to other accounts/out of MtGox actually happens.

Huh
How about people stop being cheap and just buy a yubikey. Is $30 (or however much it costs) too expensive to protect your money? Email verification pales in comparison to having a physical hardware token. Come on people,  stop being cheap and just buy the thing!

Come on, you just need to do a couple of small trades and they will send you a yubikey for free

And Google Auth is free too

Aztec
Newbie
*
Offline Offline

Activity: 56
Merit: 0



View Profile
April 21, 2013, 10:43:43 PM
 #95

Dont trust ANYONE on BTC-E Bunch of scamming C***s
bitbully (OP)
Jr. Member
*
Offline Offline

Activity: 47
Merit: 1


View Profile
April 22, 2013, 01:37:07 AM
 #96

UPDATE 4/21/13


It's been a long and hard journey, but I did it, I got my 34 bitcoins back.

First thank you to all those anonymous users out there who helped me track down the thief, and those who supported me throughout.

Luckily for me the stupid Canadian teenager who committed these crimes was very sloppy and left a massive trail which allowed us to identify him and target him on his turf @ hackforums.net. Mtgox never helped, they are the Achilles heel of bitcoin. They have overcentralized the exchanges, monopolized the control over bitcoin's value, and their customer service is non existant (I mean literally non existant, their live chat hasn't worked for weeks).

So how did I find this kid and get the coins? An amazing group of researchers put together valuable information, starting by contacting the file hosting site that hosted the trojan. They got the login and ip info and matched it to a user called PoutineCoutu across the net which has a few scam reports. We then found him highly active on hackforums.net where he was selling and GIVING AWAY bitcoins, which also matched all the activity to the bitcoin address where my coins went. He's so stupid he didn't even wash the coins and was selling them publicly. He even has multiple threads asking how to open ports on his firewall for his trojan C&C and that he is using a silent java drive-by script.

Reported to police (they are really no help, so much for paying their salary, seems they've gotten fbi reports about bitcoins and don't really like them, started asking if I pay taxes on them...), but at least I had a precedent to pursue. Tried contacting the thief, he blocked me and claimed I was blackmailing him all over the forums. This went on for a while. He was feeling the heat and dumped the coins to an offline exchange member, Xch4nge, which I tracked down immediately by tracking the coins on blockchain.info. Contacted him and what an amazing guy, helped me throughout the entire process and took alot of heat but basically a huge skid war erupted all across the forums, and he still held on to the coins for a week until finally the kid came to his senses realizing what he was doing is "bad" (and he might go to jail). He was arguing that it's okay he stole the coins from someone, but not okay someone "stole" the coins from him.

Finally he publicly agreed to allow the return of the coins. Throughout the entire process many people came to my help and provided me information about this person and one guy who goes to school with him even said that he's a $%@!. And the guy who sold him the Java script even apologized to me and said he's sorry that his script was responsible for my loss...

For the full story (if you have a few hours) go here:

http://www.scmagazine.com.au/News/339677,bitcoin-hacker-hunted.aspx
http://www.hackforums.net/showthread.php?tid=3402988
http://www.hackforums.net/showthread.php?tid=3418367&pid=32074125#pid32074125
http://www.hackforums.net/showthread.php?tid=3422032

As for the trojan and mtgox I have attached my final thoughts below.

I think this might be the first time ever someone got their bitcoins back Smiley


---------------------------------------------------------------------------------------------


Let this incident be a lesson to both me and Mtgox.  Mtgox's website is not security conscious. At no point in the registration process are the dangers of not using secondary authentication pointed out. Yes in the end it is the user's responsibility but it behooves me that they would not implement additional security protocols, the way for example the blockchain.info wallet does. Even a yubikey might not have protected me considering how compromised my system was from the trojan.

A very reasonable security feature would be to have an option for delayed withdrawal processing times, that once set cannot be changed for 24 hours. As a default of lets say 2 hours withdrawal delay I would have been able to notify mtgox to cancel the withdrawal in time. Or a simple withdrawal pin such like other bitcoin commerce sites use...

But all this is in hindsight. As for my case, analyzing my system showed that my browser and system security was misconfigured apparently due to a previous comprimising, and/or my software versions were vulnerable to an exploit which allowed the script to run unauthorized. Unfortunately there is not a fool proof scenerio to avoid malware (for a normal person, not some guru security expert).

This script, or executable installed a highly advanced trojan called dark comet which basically allowed the attacker to perform pretty much any imaginable task. How at that point the withdrawal was initiated so quickly is unknown, but it does seem the attacker had a couple minutes to act since a deeper investigation has shown the page was first opened a few minutes before the withdrawal took place. Most likely it was a combination of automatic and manual tasks which afforded the attacker access to the account. As for more advanced forms of attack, XSS or token theft, these were possibly implemented through the trojan, but it is more likely that the attacker was able to use password sniffing and info gathering techniques along with predefined scripts to yield very fast results. The payload itself was wrapped in an autoIT executable and is mostly undetectable by scanners.

Having spoken with so many programmers and IT security professionals, they have adviced that Mt.Gox is highly vulnerable to different forms of web application attacks and should pursue penetration testing services immediately. My understanding is that they didn't learn from the first time.
darkmule
Legendary
*
Offline Offline

Activity: 1176
Merit: 1005



View Profile
April 22, 2013, 04:51:22 AM
 #97

Well played, sir.

I have to say it's really great to see one of these stories with a happy ending for a change.  This is how it should be more often.
mrb
Legendary
*
Offline Offline

Activity: 1512
Merit: 1027


View Profile WWW
April 22, 2013, 05:13:24 AM
Last edit: April 22, 2013, 05:23:55 AM by mrb
 #98

bitbully, MtGox is not "vulnerable to different forms of web application attacks". Stop spreading FUD. People may say this, but they don't know what they are talking about.

I am a security professional and let me tell you that while MtGox used to be vulnerable to flaws like CSRF and XSS (back in 2010 / early 2011), it is not the same website anymore. It is today considered well-secured and well-designed: HTTPS, 2-factor auth, etc. To my knowledge there has been no known CSRF or XSS flaw in the last year or so. Although, as a security professional, I know that all big enough websites are bound to have flaws here and there, but again MtGox appears to be well-secured. Don't say that it is known to be "vulnerable to different forms of web application attacks".

As you said yourself, you were instead compromised by a local trojan: Dark Comet. No amount of web security features (other than 2-factor auth) can protect you from a local trojan running with all local privileges. You failed to use 2-factor auth and that is "how you got robbed of 34 BTC". You are right that MtGox should advertise 2-factor auth / Yubikey more, but no amount of explaining security to users is going to convince all of them to buy a Yubikey. MtGox even tried to offer free Yubikeys but some users still did not take the offer!

01BTC10
VIP
Hero Member
*
Offline Offline

Activity: 756
Merit: 503



View Profile
April 22, 2013, 05:15:14 AM
 #99

Nice read but Dark Comet is not a highly advanced trojan. It's part of the standard script kiddies toolbox. Glad you got your bitcoins back.
slippyrocks
Member
**
Offline Offline

Activity: 69
Merit: 10


respecttheslider


View Profile
April 23, 2013, 03:18:29 AM
Last edit: April 23, 2013, 03:35:41 AM by slippyrocks
 #100

100% Sun Microsystems Java plug-in's fault, absolute shit for security.

If you must install it limit it to run only in trusted domains.

Am running ESET NOD32 antivirus trial it won't even let me visit that exploit website.

-----------------
free trial 30day, continues to work after expiration will nag
http://www.eset.com/us/download/home/detail/family/2/?trl=ea

am using opera browser is lightweight and very fast no disk cache
http://www.opera.com/

ghostery addon for privacy ad remove and no cross site tracking
https://addons.opera.com/en/extensions/details/ghostery/



Pages: « 1 2 3 4 [5]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!