Bitcoin Forum
April 26, 2024, 05:11:19 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Theft of small amount BTC from VirWox (RESOLVED: TROJAN)  (Read 1145 times)
juniper (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
April 21, 2013, 04:45:34 PM
Last edit: April 22, 2013, 11:54:31 AM by juniper
 #1

New to BTC but I know what I'm doing. Bought some play BTC at VirWox. Just the other day got an e-mail confirmation that the account was drained to an address that I don't recognize (edit: not technically gambling my money away...yet).  

Unusual is that I am using a very strong password (random letters and numbers).  Have just sent note to VirWox about this.  Have examined my computer, no infection.  Not sure how they got my password.

Has anyone else had experience with VirWox about this sort of thing?  Take care, as their security may have been breached.

EDIT: Read to bottom. Not VirWox. My computer was compromised. Will post more details here when I've sorted it out. Appears related to this: https://bitcointalk.org/index.php?topic=180746.0.  tl;dr: I broke my cardinal rule. I allowed JAVA to run in my browser.
1714151479
Hero Member
*
Offline Offline

Posts: 1714151479

View Profile Personal Message (Offline)

Ignore
1714151479
Reply with quote  #2

1714151479
Report to moderator
1714151479
Hero Member
*
Offline Offline

Posts: 1714151479

View Profile Personal Message (Offline)

Ignore
1714151479
Reply with quote  #2

1714151479
Report to moderator
"Governments are good at cutting off the heads of a centrally controlled networks like Napster, but pure P2P networks like Gnutella and Tor seem to be holding their own." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714151479
Hero Member
*
Offline Offline

Posts: 1714151479

View Profile Personal Message (Offline)

Ignore
1714151479
Reply with quote  #2

1714151479
Report to moderator
syebotext
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
April 21, 2013, 05:11:16 PM
 #2

Thanks for the headsup. I was thinking about transferring some of my funds there to get them out by Paypal but now I will not do that.
juniper (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
April 21, 2013, 05:14:35 PM
 #3

I will keep this forum posted with any response I hear from them.
Moebius327
Hero Member
*****
Offline Offline

Activity: 770
Merit: 500



View Profile
April 21, 2013, 08:02:02 PM
 #4

Is there any update on that? I am considering buying Linden with PP and exchanging to BTC.
hitman_8787
Newbie
*
Offline Offline

Activity: 58
Merit: 0


View Profile
April 21, 2013, 08:05:59 PM
 #5

interested in this too.
blue42
Newbie
*
Offline Offline

Activity: 12
Merit: 0


View Profile
April 21, 2013, 08:29:17 PM
 #6

Be sure to use two-factor authentication on all your bitcoin services.
juniper (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
April 21, 2013, 09:25:00 PM
 #7

I'm still here. VirWox got back to me.  Someone from a 63.* (US address, which I may post in full here later) hit my account, logged in on the first try, no failed attempts, and moved the money.  They then showed up once more 10 hours later to see the transfer still in progress.  I've been told I may be compromised.  Now, I appreciate this may be true, and I continue to scan.  However, I've run virus and malware scans, and they've turned up nothing.  This computer was just bought about 6 months ago and is relatively fresh.  I'm reasonably safe about things and don't install stupid software.

The reality is that I made this account about a week and a half ago. I threw small amount of money in at the time. I then threw a little bit more. I was debating where to move the BTC to when, four days after my last deposit, the thief hit my account dead on, first try, and moved the money.  On a 12 character random password with letters and numbers that's pretty amazing.  But if I were compromised, how did they manage to track me so closely that the very first time I put money into BTC (and not that much) they strike?  Why not wait until I put more?  And how did they know right now?

Things still don't add up for me.

Yeah 2-factor is great.  If this hadn't have been a play account, sure, absolutely use 2-factor.  But that also doesn't solve the mystery of the spectacular coincidences above.
zinner27
Newbie
*
Offline Offline

Activity: 34
Merit: 0



View Profile
April 21, 2013, 09:29:12 PM
 #8

Are you using Wifi router? Do you live alone or have somebody at your place who could use ur computer?

Hard to say about keylogers etc many of which are not detectable...
juniper (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
April 21, 2013, 09:33:09 PM
 #9

Are you using Wifi router? Do you live alone or have somebody at your place who could use ur computer?

Hard to say about keylogers etc many of which are not detectable...

WiFi locked with WPA2-PKIP, strong password of about 24 characters, and the router MAC address locked to the five or six wireless devices that use it.  I thought of that and checked it.

Mystery goes on.  Spybot clear.  On to MBAM.
hitman_8787
Newbie
*
Offline Offline

Activity: 58
Merit: 0


View Profile
April 21, 2013, 09:50:39 PM
 #10

Maybe a "friend" of yours who has access at your computer and knew you've deposited money?
juniper (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
April 21, 2013, 09:54:46 PM
 #11

Maybe a "friend" of yours who has access at your computer and knew you've deposited money?

No. I found it. MBAM detected trojan. Now to figure out how long it's been on my system. Still amazing they detected the deposit as shortly after I made it as they did. Will post details shortly, but the long and short is check /%user/appdata/roaming/windir/svchost.exe.

GerMG
Newbie
*
Offline Offline

Activity: 14
Merit: 0



View Profile WWW
April 21, 2013, 09:54:59 PM
 #12

allways 2 factor
juniper (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
April 22, 2013, 11:57:30 AM
 #13

For anyone who is interested, I landed on a page purporting to have some java on it.  When nothing happened I simply left, but the java had already dropped a file on my system %USER%\AppData\Roaming\smss2.exe, that I believe retrieved further payload of a keylogger from a remote server.  The keylogger ran as SVCHOST.EXE and lived in %USER%\AppData\Roaming\WinDir\svchost.exe and I believe dropped a log under \Roaming. 

Avast missed it. Spybot missed it. MalwareBytes caught it.

Anyone who can decode:
ufHIl_IOk
please let me know.  (There's more text but I don't want to post it here.)  It's probably a ROT code.
juniper (OP)
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
April 27, 2013, 06:20:33 PM
 #14

No dice on the text decoding anyone?

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!