Bitcoin Forum
November 05, 2024, 05:01:08 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 [5] 6 »  All
  Print  
Author Topic: Wallet Hack on 4/25  (Read 11262 times)
zebedee
Donator
Hero Member
*
Offline Offline

Activity: 668
Merit: 500



View Profile
April 28, 2013, 09:53:46 PM
 #81

I now believe I know how they got my friend's coins.


She'd given her account a short, 4-letter alias.  Her 10-letter password began with that alias, in a way that a human might be able to guess the first 8 letters(the final two were numbers).  Doh.
 
I believe that several attack vectors are being used, and that one is someone is cycling through short aliases, perhaps regardless of spelling, and longer aliases that are dictionary words. Knowing the alias used to be enough, without 2 factor, for blockchain.info to give up your encrypted wallet. They are then brute forcing passwords, trying both common passwords, dictionary words, and others beginning or ending with the alias.
marcus_of_augustus
Legendary
*
Offline Offline

Activity: 3920
Merit: 2349


Eadem mutata resurgo


View Profile
April 28, 2013, 10:52:31 PM
 #82

Guess there are a lot of GPU clusters coming available now that are basically set up for brute forcing passwords .... "strong" password does not mean what it used to?

jubalix
Legendary
*
Offline Offline

Activity: 2632
Merit: 1023


View Profile WWW
April 29, 2013, 12:16:22 AM
 #83

Guess there are a lot of GPU clusters coming available now that are basically set up for brute forcing passwords .... "strong" password does not mean what it used to?

thats why you need 20 plus long password

Admitted Practicing Lawyer::BTC/Crypto Specialist. B.Engineering/B.Laws

https://www.binance.com/?ref=10062065
silvereagle (OP)
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
April 29, 2013, 01:30:01 AM
 #84

Update - after speaking some more with my affected customer I am no longer convinced his password was indeed strong enough.

Maybe passwords were brute-forced after all? silvereagle - just how strong was your password?

Will be happy to hear about any progress in figuring this out.

Alias was very short so may have been hackable.  Password was 15 characters long but made up of multiple words that may have been found in dictionary.  Possible but permutations to put that many words together would still be extremely high.
zebedee
Donator
Hero Member
*
Offline Offline

Activity: 668
Merit: 500



View Profile
April 29, 2013, 02:00:04 AM
 #85

Also I have setup several wallets with deliberately weak passwords that are unemptied.
Do any of those wallets have easily guessable aliases?  I imagine if they had, they would be empty now.  Of course, now you're forcing email confirmation for aliases (sometimes, always?) so it wouldn't work so easily.
Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
April 29, 2013, 02:09:19 AM
 #86

Here is an example of my logins for banks and Mt. Gox:

Username: kl2uggsyf3yue9g4e2
Password: t#nocq2*l4c*b1yibxf%tazzh0^$)^ft0

Both are limited by what the system will accept. Some of my bank usernames only accept letters and numbers (alphanumeric). Some corporate bank accounts also include a bank generated company code (which I don't have control of).

The above is not an actual account, it is just an example.

For forums, like this one, I use a simple username, like, Dabs. The password is just as long and complicated.

Where my username is not likely to ever be seen by anyone else, I pick a long random username. Banks and bitcoin exchanges and bitcoin wallets are examples.

jubalix
Legendary
*
Offline Offline

Activity: 2632
Merit: 1023


View Profile WWW
April 29, 2013, 02:13:58 AM
 #87

Here is an example of my logins for banks and Mt. Gox:

Username: kl2uggsyf3yue9g4e2
Password: t#nocq2*l4c*b1yibxf%tazzh0^$)^ft0

Both are limited by what the system will accept. Some of my bank usernames only accept letters and numbers (alphanumeric). Some corporate bank accounts also include a bank generated company code (which I don't have control of).

The above is not an actual account, it is just an example.

For forums, like this one, I use a simple username, like, Dabs. The password is just as long and complicated.

Where my username is not likely to ever be seen by anyone else, I pick a long random username. Banks and bitcoin exchanges and bitcoin wallets are examples.

I would like to see sites use KEY files like true crypt does (but check client side never upload)....a JPG as a KEY file is basically unhackable, even keyloggers would be hard as they would have to record where you pointed your mouse

Admitted Practicing Lawyer::BTC/Crypto Specialist. B.Engineering/B.Laws

https://www.binance.com/?ref=10062065
Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
April 29, 2013, 06:11:08 AM
 #88

Keyfiles stored on your computer would have to be uploaded to their servers for hashing, OR your client side browser will have to perform the hashing offline, and submit your result online.

In either case, MITM or eavesdroppers can intercept the keyfiles. There would have to be some sort of public key or SSL encryption going on for this to work, so no one else can grab your keyfile or the hash of that keyfile.

If your computer is compromised, they can get your keyfile.

jubalix
Legendary
*
Offline Offline

Activity: 2632
Merit: 1023


View Profile WWW
April 29, 2013, 07:16:14 AM
 #89

Keyfiles stored on your computer would have to be uploaded to their servers for hashing, OR your client side browser will have to perform the hashing offline, and submit your result online.

In either case, MITM or eavesdroppers can intercept the keyfiles. There would have to be some sort of public key or SSL encryption going on for this to work, so no one else can grab your keyfile or the hash of that keyfile.

If your computer is compromised, they can get your keyfile.

but how would they know which out of 1x10e6 files is my key file, or which combination of 2, 3 or more key files is are my key files?

how do they even know i use a key file???

Admitted Practicing Lawyer::BTC/Crypto Specialist. B.Engineering/B.Laws

https://www.binance.com/?ref=10062065
Meni Rosenfeld
Donator
Legendary
*
Offline Offline

Activity: 2058
Merit: 1054



View Profile WWW
April 29, 2013, 07:30:50 AM
 #90

Here is an example of my logins for banks and Mt. Gox:

Username: kl2uggsyf3yue9g4e2
Password: t#nocq2*l4c*b1yibxf%tazzh0^$)^ft0
Were you a victim of this? Are you providing evidence that this was not brute-force, or simply explaining how to properly choose passwords?

1EofoZNBhWQ3kxfKnvWkhtMns4AivZArhr   |   Who am I?   |   bitcoin-otc WoT
Bitcoil - Exchange bitcoins for ILS (thread)   |   Israel Bitcoin community homepage (thread)
Analysis of Bitcoin Pooled Mining Reward Systems (thread, summary)  |   PureMining - Infinite-term, deterministic mining bond
willphase
Hero Member
*****
Offline Offline

Activity: 767
Merit: 500


View Profile
April 29, 2013, 07:42:09 AM
 #91

Just a friendly PSA that if you ever had a weak password or a weak alias on your blockchain.info account, then someone could be running bruteforce on your wallet as we speak, regardless of whether you later upgraded the security (e.g. added 2FA or added an IP block, or deleted/changed your alias)

So, if you upgrade your security, I recommend you move your bitcoins off the keys that might have been previously compromised.  It's not like changing your password on blockchain.info changes your keys.

If in doubt, generate a new blockchain.info wallet, set up 2FA and secure passwords, IP blocks etc etc, then move your bitcoins from your old potentially compromised wallet to your new one.  I personally would consider any keys stored under an 'insecure blockchain.info wallet' compromised (but not perhaps until some time in the future).

Will

Remember remember the 5th of November
Legendary
*
Offline Offline

Activity: 1862
Merit: 1011

Reverse engineer from time to time


View Profile
April 29, 2013, 07:46:32 AM
 #92

Also having a feature to block other IPs from entering the account would be nice, with the ability to add exceptions(home,work,phone).

BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
Amph
Legendary
*
Offline Offline

Activity: 3248
Merit: 1070



View Profile
April 29, 2013, 08:17:37 AM
 #93

best user and password is= empty wallet
Kaiji
Full Member
***
Offline Offline

Activity: 140
Merit: 100


Hoist the Colours


View Profile
April 29, 2013, 02:32:22 PM
 #94


For storing large numbers of bitcoins an online bitcoin bank is needed. Unfortunately it will only be a matter of time before it is hacked or the owner of the site absconds with users bitcoins.
Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
April 29, 2013, 02:53:21 PM
 #95

but how would they know which out of 1x10e6 files is my key file, or which combination of 2, 3 or more key files is are my key files?

how do they even know i use a key file???

The keylogger trojan or malware is surely going to be capturing your screen. They can know which file is your keyfile. I'm not saying that this is being done now, I am saying this is possible.

Were you a victim of this? Are you providing evidence that this was not brute-force, or simply explaining how to properly choose passwords?

I don't use block chain, so I am not a victim, merely showing how to properly choose good passwords.

jubalix
Legendary
*
Offline Offline

Activity: 2632
Merit: 1023


View Profile WWW
April 29, 2013, 05:49:03 PM
 #96

but how would they know which out of 1x10e6 files is my key file, or which combination of 2, 3 or more key files is are my key files?

how do they even know i use a key file???

The keylogger trojan or malware is surely going to be capturing your screen. They can know which file is your keyfile. I'm not saying that this is being done now, I am saying this is possible.

Were you a victim of this? Are you providing evidence that this was not brute-force, or simply explaining how to properly choose passwords?

I don't use block chain, so I am not a victim, merely showing how to properly choose good passwords.

no key loggers don't usually do screen captures....you would soon notice this as your hard-rive would be full or your bandwidth consumed or always slow....

Admitted Practicing Lawyer::BTC/Crypto Specialist. B.Engineering/B.Laws

https://www.binance.com/?ref=10062065
Aseras
Hero Member
*****
Offline Offline

Activity: 658
Merit: 500


View Profile
April 29, 2013, 08:18:57 PM
 #97

it would probably help if blockchain's iphone and android app didnt store the main password in plaintext.
shawshankinmate37927
Hero Member
*****
Offline Offline

Activity: 854
Merit: 1000


Bitcoin: The People's Bailout


View Profile
April 30, 2013, 01:27:02 AM
 #98

Also having a feature to block other IPs from entering the account would be nice, with the ability to add exceptions(home,work,phone).

Blockchain.info's My Wallet service already offers this ability.  It can be found under the Security menu option on the Account Settings page.  (Of course, this won't help if a hacker already has copies of your private keys.)

"It is well enough that people of the nation do not understand our banking and monetary system, for if they did, I believe there would be a revolution before tomorrow morning."   - Henry Ford
Newar
Legendary
*
Offline Offline

Activity: 1358
Merit: 1001


https://gliph.me/hUF


View Profile
April 30, 2013, 02:44:20 AM
 #99

it would probably help if blockchain's iphone and android app didnt store the main password in plaintext.
There's an update available for Android that fixes this. https://bitcointalk.org/index.php?topic=40264.msg1966450#msg1966450

OTC rating | GPG keyid 1DC91318EE785FDE | Gliph: lightning bicycle tree music | Mycelium, a swift & secure Bitcoin client for Android | LocalBitcoins
Luckybit
Hero Member
*****
Offline Offline

Activity: 714
Merit: 510



View Profile
April 30, 2013, 03:07:53 AM
 #100

I posted same thing couple topics down.

Second time in two weeks.  One coin each time. Changed pw on every account and activated logging.

No log of withdraw.

Now getting freaked little.

Create a new account from a Linux liveCD and consider your computer compromised. Use someone elses computer. Set up two factor authentication. Perhaps consider investing in a Yubikey.
Pages: « 1 2 3 4 [5] 6 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!