Bitcoin Forum
December 04, 2016, 08:20:36 AM *
News: Latest stable version of Bitcoin Core: 0.13.1  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: [1]
  Print  
Author Topic: Bitcoin malware samples  (Read 687 times)
CamelToeBob
Newbie
*
Offline Offline

Activity: 5


View Profile
June 18, 2011, 09:32:43 PM
 #1

If anyone has managed to gather any samples myself and a few friends would love to take a look at them. Results from the analysis would be posted back here in their entirety.
1480839636
Hero Member
*
Offline Offline

Posts: 1480839636

View Profile Personal Message (Offline)

Ignore
1480839636
Reply with quote  #2

1480839636
Report to moderator
1480839636
Hero Member
*
Offline Offline

Posts: 1480839636

View Profile Personal Message (Offline)

Ignore
1480839636
Reply with quote  #2

1480839636
Report to moderator
1480839636
Hero Member
*
Offline Offline

Posts: 1480839636

View Profile Personal Message (Offline)

Ignore
1480839636
Reply with quote  #2

1480839636
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
ajolly
Jr. Member
*
Offline Offline

Activity: 55


View Profile
June 22, 2013, 05:52:29 PM
 #2

Ditto. Will take any new malware samples out there Smiley
itsunderstood
Sr. Member
****
Offline Offline

Activity: 364


American1973


View Profile
June 22, 2013, 06:07:51 PM
 #3

This could be a really useful thread to keep people informed.

I would watch for a maginificent upscale in the # of spearfishing attempts (crafted phish messages to incite mouseclickie) when all the masses stream into crypto once the debt systems of the world begin to fail.  At that time, the scumbags will be filling everyone's inboxes.  It's much more profitable to tactically map the general stupidity (clicking emails) than to craft actual code to do such and such.

But, as with the Siemens debauching their own systems with Stuxnet, I expect the true behemoth of cryptocoin malware is being crafted right now, and will be fielded by you-know-who, who fielded Stuxnet for the same reason.  Teams of programmers built Stuxnet over at least two years.

If they built Stuxnet, which basically has made all SCADA control systems unreliable now (read: more meltdowns someday), then the post mortem on their bitcoin weapon malware when they field it, will take some time as well.  Better if some tech working on it right now, can do a Snowden and out them before that thing even gets built.  My .02

Check out my prescient ATS thread from 2008: "Windows XP: End the Cyberwar, Open the Code Now!" http://www.abovetopsecret.com/forum/thread411978/pg1
320d
Newbie
*
Offline Offline

Activity: 25



View Profile
June 22, 2013, 06:21:35 PM
 #4

I found it on Google in less then one minute.
I will post it here if a moderator or admin allows me to do it.
Pages: [1]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!