Bitcoin Forum
April 20, 2024, 02:32:00 AM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 4 5 6 7 8 9 »  All
  Print  
Author Topic: Monitoring WannaCry hackers' bitcoin addresses in real time  (Read 22951 times)
freedomno1
Legendary
*
Offline Offline

Activity: 1806
Merit: 1090


Learning the troll avoidance button :)


View Profile
May 14, 2017, 04:54:36 AM
Last edit: May 14, 2017, 05:20:13 AM by freedomno1
 #21

Now how they will spend their hard earned hacking money, considering the addresses are known and probably are blacklisted everywhere?


Putting the coins through a mixing service most likely.

Would say they mix the coins a few times before they move the coins to an exchange to convert them into alt-coins or cash then repeat the cycle and so that no one can follow the route.
Either that or sell them to someone in person/generate new wallet keys before mixing them.
That or buy giftcards

Believing in Bitcoins and it's ability to change the world
1713580320
Hero Member
*
Offline Offline

Posts: 1713580320

View Profile Personal Message (Offline)

Ignore
1713580320
Reply with quote  #2

1713580320
Report to moderator
1713580320
Hero Member
*
Offline Offline

Posts: 1713580320

View Profile Personal Message (Offline)

Ignore
1713580320
Reply with quote  #2

1713580320
Report to moderator
Each block is stacked on top of the previous one. Adding another block to the top makes all lower blocks more difficult to remove: there is more "weight" above each block. A transaction in a block 6 blocks deep (6 confirmations) will be very difficult to remove.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713580320
Hero Member
*
Offline Offline

Posts: 1713580320

View Profile Personal Message (Offline)

Ignore
1713580320
Reply with quote  #2

1713580320
Report to moderator
1713580320
Hero Member
*
Offline Offline

Posts: 1713580320

View Profile Personal Message (Offline)

Ignore
1713580320
Reply with quote  #2

1713580320
Report to moderator
1713580320
Hero Member
*
Offline Offline

Posts: 1713580320

View Profile Personal Message (Offline)

Ignore
1713580320
Reply with quote  #2

1713580320
Report to moderator
RoommateAgreement
Hero Member
*****
Offline Offline

Activity: 770
Merit: 500


Bazinga!


View Profile
May 14, 2017, 04:58:50 AM
 #22

Now how they will spend their hard earned hacking money, considering the addresses are known and probably are blacklisted everywhere?


Putting the coins through a mixing service most likely.

the simplest way is using a real anon cryptocurrency not bitcoin which is not anonymous. the best thing that can be found is Monero (XMR) and they most probably will use that in their route, convert to monero > reach anonymity convert to fiat. and eventually they will switch to asking for that coin in first place.

Buying the dip...
Herbert2020
Legendary
*
Offline Offline

Activity: 1946
Merit: 1137


View Profile
May 14, 2017, 05:05:41 AM
 #23

to OP:
you don't need to update the balance each time it receives a transaction, there are so many cool tools for it Smiley

use this one:
Code:
[img]http://btc-priceimg.herokuapp.com/balance/<address>/<color>[/img]
replace <address> with address and <color> (html-like hex code) is not needed but is an option to change the color of the text.
ref: https://btc-priceimg.herokuapp.com/

example:


Weak hands have been complaining about missing out ever since bitcoin was $1 and never buy the dip.
Whales are those who keep buying the dip.
MysticOne
Jr. Member
*
Offline Offline

Activity: 59
Merit: 10


View Profile
May 14, 2017, 05:20:27 AM
 #24

For a global attack they have not collected a lot of bitcoin yet. Results as of 16:00 GMT

Address 1: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

live link: https://blockchain.info/address/12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

31 transactions = 4.65255659 BTC



Address 2: 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

live link: https://blockchain.info/address/115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

27 transactions = 3.10004389 BTC



Wallet 3: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

live link: https://blockchain.info/address/13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

36 transactions = 6.53259945 BTC



~ 14.28 BTC x $1735.35 per BTC = $24,781 ransom paid thus far.



Add more addresses as you find them.


UPDATE: 02:15 GMT

Address 1: 39 transactions = 6.97303882 BTC
Address 2: 30 transactions = 3.64134512 BTC
Address 3: 35 transactions = 5.00218759 BTC

EDIT: How could an address grow in transactions and shrink in total BTC when no withdrawals have taken place? (see address #3)

   Are you sure address 3 had 6.5235 btc in it at that time? I am seeing only 5.50119801 in it at this time. 🙃
NeuroticFish
Legendary
*
Offline Offline

Activity: 3654
Merit: 6349


Looking for campaign manager? Contact icopress!


View Profile
May 14, 2017, 06:42:18 AM
 #25

Are you sure address 3 had 6.5235 btc in it at that time? I am seeing only 5.50119801 in it at this time. 🙃

Maybe some transactions got double spent / dropped?
Although who the heck would pay ransomware from the start when they know to double spend?!

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
iamTom123
Hero Member
*****
Offline Offline

Activity: 490
Merit: 501



View Profile
May 14, 2017, 06:48:02 AM
 #26

Do people really not back up their files regularly? I would assume that a huge part of the reason the thieves aren't getting as much money as we'd expect is because most people back up their files at least every month or so.  Institutions should back up their files much more regularly than that. Unless there's very significant new sensitive information that needs decrypting, there's not much reason for people to pay such a big ransom.  If it was $20 instead, I would probably pay it anyway, but there's really no point.

This and many other lessons of this recent attack should be shared to all people and firms who can be subjected to the same thing later. This is now a new form of terrorism and on the side of the hackers/programmers can be a good source of money via Bitcoin. I am sure this will not be the last and in fact can be inducing more attacks in varying degrees and forms in the coming months and years. We should be careful and maybe NSA should be spending more time, focus and resources on this one.
Qartada
Hero Member
*****
Offline Offline

Activity: 546
Merit: 500


View Profile WWW
May 14, 2017, 07:32:39 AM
 #27

Now how they will spend their hard earned hacking money, considering the addresses are known and probably are blacklisted everywhere?


Putting the coins through a mixing service most likely.

the simplest way is using a real anon cryptocurrency not bitcoin which is not anonymous. the best thing that can be found is Monero (XMR) and they most probably will use that in their route, convert to monero > reach anonymity convert to fiat. and eventually they will switch to asking for that coin in first place.
It's quite a bit harder to exchange fiat for Monero.  People would have to go through Bitcoin themselves before they buy Monero and it would be a lot of inconvenience on top of the cost of the ransom which might give them an incentive not to pay it.

The thieves, however, can just take the Bitcoin through mixers into Shapeshift and take Monero out, then start exchanging that back into fiat.  As I recall there are services that accept Monero and then pay Bitcoin addresses with the value of the Monero you sent them, so they could connect to a LocalBitcoins user or something that way.

It shouldn't be hard to exploit Monero's anonymity for it.

eckmar
Legendary
*
Offline Offline

Activity: 1878
Merit: 1038


Telegram: https://t.me/eckmar


View Profile
May 14, 2017, 08:36:53 AM
 #28

If it was $20 instead, I would probably pay it anyway, but there's really no point.

Yes, that's why they don't really target individuals. But if they've found a couple of sloppy companies, jackpot!


I assume the following:
- that some institutions reverted to clean backups
- there are more than 3 addresses
- spread was stopped by a blogger who discovered a kill switch in the virus (this has been verified) - https://www.theguardian.com/technology/2017/may/13/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack

There have to be more than 3 addresses. And it's Saturday, many companies cannot access their money until the banks open Monday. Only then we'll see how big the damage is...
Do you really think that those big companies that are affected by the virus will be paying bitcoins to decrypt their infected files? I think they just get specialist to remove the ransomware, but I am not sure if that is even possible with this big infection from last week.

Big companies have insurances for the event like this that will probably pay this for them...
coinits (OP)
Legendary
*
Offline Offline

Activity: 1582
Merit: 1019


011110000110110101110010


View Profile
May 14, 2017, 12:26:39 PM
 #29

For a global attack they have not collected a lot of bitcoin yet. Results as of 16:00 GMT

Address 1: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

live link: https://blockchain.info/address/12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

31 transactions = 4.65255659 BTC



Address 2: 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

live link: https://blockchain.info/address/115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

27 transactions = 3.10004389 BTC



Wallet 3: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

live link: https://blockchain.info/address/13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

36 transactions = 6.53259945 BTC



~ 14.28 BTC x $1735.35 per BTC = $24,781 ransom paid thus far.



Add more addresses as you find them.


UPDATE: 02:15 GMT

Address 1: 39 transactions = 6.97303882 BTC
Address 2: 30 transactions = 3.64134512 BTC
Address 3: 35 transactions = 5.00218759 BTC

EDIT: How could an address grow in transactions and shrink in total BTC when no withdrawals have taken place? (see address #3)

UPDATE: May 14, 2017 12:25 GMT

Address 1: 47 transactions = 8.4448838 BTC
Address 2: 35 transactions = 4.0009201 BTC
Address 3: 42 transactions = 5.83614653 BTC

Jump you fuckers! | The thing about smart motherfuckers is they sound like crazy motherfuckers to dumb motherfuckers. | My sig space for rent for 0.01 btc per week.
joshy23
Sr. Member
****
Offline Offline

Activity: 1078
Merit: 256



View Profile
May 14, 2017, 01:10:05 PM
 #30

Now how they will spend their hard earned hacking money, considering the addresses are known and probably are blacklisted everywhere?


Putting the coins through a mixing service most likely.

Next logical step maybe is to try to talk to this mixing services and to not let them used their services. But I doubt any agency specially UK and USA will do this for the sake of capturing the culprit. Or maybe the mixing services will do their own action, so that they can't used any exchange to convert the bitcoin they stole to fiat. Its like releasing the bitcoin wallet to all exchanges so that it will be blacklisted.
rifiuti
Full Member
***
Offline Offline

Activity: 320
Merit: 101


View Profile
May 14, 2017, 02:38:58 PM
 #31

Almost $32k received based on the current btc rate.
wxa7115
Hero Member
*****
Offline Offline

Activity: 2702
Merit: 704



View Profile
May 14, 2017, 03:08:03 PM
 #32

Do people really not back up their files regularly?

I would assume that a huge part of the reason the thieves aren't getting as much money as we'd expect is because most people back up their files at least every month or so.  Institutions should back up their files much more regularly than that.

Unless there's very significant new sensitive information that needs decrypting, there's not much reason for people to pay such a big ransom.  If it was $20 instead, I would probably pay it anyway, but there's really no point.
No people never backup their files, and a lot of business don’t do it either, they should do it but they don’t, I’m not an expert on computers by any means but sometimes friends ask me to fix their computers and that is one of the first questions I ask and the answer is always no.

.
.DuelbitsSPORTS.
▄▄▄███████▄▄▄
▄▄█████████████████▄▄
▄██████████████████████▄
██████████████████████████
███████████████████████████
██████████████████████████████
██████████████████████████████
█████████████████████████████
███████████████████████████
█████████████████████████
▀████████████████████████
▀▀███████████████████
██████████████████████████████
██
██
██
██

██
██
██
██

██
██
██
████████▄▄▄▄██▄▄▄██
███▄█▀▄▄▀███▄█████
█████████████▀▀▀██
██▀ ▀██████████████████
███▄███████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
▀█████████████████████▀
▀▀███████████████▀▀
▀▀▀▀█▀▀▀▀
OFFICIAL EUROPEAN
BETTING PARTNER OF
ASTON VILLA FC
██
██
██
██

██
██
██
██

██
██
██
10%   CASHBACK   
          100%   MULTICHARGER   
BlackPanda
Legendary
*
Offline Offline

Activity: 1414
Merit: 1001



View Profile
May 14, 2017, 03:10:54 PM
 #33

This is one very bad crime. They are washing the data and then forcing it to do a transaction with bitcoin.
This can make bitcoin less trustworthy. Just imagine they use bitcoin for crime.
deisik
Legendary
*
Offline Offline

Activity: 3430
Merit: 1280


English ⬄ Russian Translation Services


View Profile WWW
May 14, 2017, 03:39:06 PM
 #34

Do you really think that those big companies that are affected by the virus will be paying bitcoins to decrypt their infected files? I think they just get specialist to remove the ransomware, but I am not sure if that is even possible with this big infection from last week

If the files are encrypted, that will be next to impossible (as others have said already)

Regarding big companies paying the ransom, it doesn't as much depend on the size of the company as on the importance of files encrypted, though it would be strange for a big company not to regularly backup their important data. As the saying goes, there are two kinds of people, those who create backups and those who don't yet. Apart from that, how many big names have been really affected by this piece of ransomware?

Almost $32k received based on the current btc rate.

That's nothing in terms of impact on Bitcoin price

pixie85
Hero Member
*****
Offline Offline

Activity: 2128
Merit: 524


View Profile
May 14, 2017, 03:54:06 PM
 #35

Almost $32k received based on the current btc rate.

That's nothing in terms of impact on Bitcoin price
I'd say that's a fair amount of money for making an encrypting trojan. It paid well for the time they spent making it, especially well since they left an easy to find way to shut it all down. Also I don't think the price decreased purely because of this hack. It didn't target the Bitcoin network, so there was no reason to panic and the price was peaking for days. People were waiting to take their profits.
User365
Sr. Member
****
Offline Offline

Activity: 434
Merit: 251


physics, mathematics and engineering


View Profile
May 14, 2017, 03:58:52 PM
 #36

WannaCry 2.0 is out and, guess what there is no killswitch anymore  Grin

If you wanna protect against such threats, check out https://bitcointalk.org/index.php?topic=1903071.msg18888453#msg18888453
Its impossible to get infected with WannaCry if you follow the whole guide

[could be your ad]
streazight
Hero Member
*****
Offline Offline

Activity: 910
Merit: 502


View Profile
May 14, 2017, 07:11:38 PM
 #37

For a global attack they have not collected a lot of bitcoin yet. Results as of 16:00 GMT

Address 1: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

live link: https://blockchain.info/address/12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

31 transactions = 4.65255659 BTC



Address 2: 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

live link: https://blockchain.info/address/115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

27 transactions = 3.10004389 BTC



Wallet 3: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

live link: https://blockchain.info/address/13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

36 transactions = 6.53259945 BTC



~ 14.28 BTC x $1735.35 per BTC = $24,781 ransom paid thus far.



Add more addresses as you find them.

As compare to a massive world wide attack, the amount collected so far is not as much as it should be.  I also wonder if the people after paying the ransom, were there computer back to normal or still they remain affected by virus ?
The virus made the files encrypted and then it will decrypted once you pay $300 as a ransom. 
To help reducing further spreading of the ransomware possible measurement should be taken to avoid opening unknown emails and especially the one related to invoice.
deisik
Legendary
*
Offline Offline

Activity: 3430
Merit: 1280


English ⬄ Russian Translation Services


View Profile WWW
May 14, 2017, 07:27:31 PM
 #38

Almost $32k received based on the current btc rate.

That's nothing in terms of impact on Bitcoin price
I'd say that's a fair amount of money for making an encrypting trojan. It paid well for the time they spent making it, especially well since they left an easy to find way to shut it all down. Also I don't think the price decreased purely because of this hack. It didn't target the Bitcoin network, so there was no reason to panic and the price was peaking for days. People were waiting to take their profits.

Well, we don't know that for sure

Maybe, they didn't pay anything at all and just stole the code from the Alphabet agency (maybe, it was one of their employees or something to that tune). We don't know either if they will be caught but if they do get caught eventually, no amount of profit will be worth it unless they get off cheaply while extorting literally millions of dollars (like Cryptsy scammers did). Regarding Bitcoin prices, I'm never tired to repeat that with higher price we should expect higher volatility, even in relative terms, so the price swings of 200 dollars shouldn't surprise anyone any more. My best bet is for 1,200 dollars as a new support level and 2,000 dollars as a new resistance level

lite
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009


View Profile
May 14, 2017, 07:36:36 PM
 #39

Do people really not back up their files regularly?
No, they're too lazy to do it! i keep most of my files on external hdd and some important files on google drive(automatic sync) and i don't use windows. Wink

why isn't ETH demanded as ransom? leave bitcoin alone.
unamis76
Legendary
*
Offline Offline

Activity: 1512
Merit: 1005


View Profile
May 14, 2017, 07:39:54 PM
Last edit: May 15, 2017, 11:02:34 AM by unamis76
 #40

Addresses are a little over 20 BTC. Never thought they'd see this much money, actually...

Question: Once you pay the ransom, how does the hacker know it was you who paid?

I missed that part. I mean people are sending their BTC to them. How are they tying the payment to the computer?

I was questioning myself exactly this. Maybe the ransomware has a place to input txid?
Pages: « 1 [2] 3 4 5 6 7 8 9 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!