freedomno1
Legendary
Offline
Activity: 1806
Merit: 1090
Learning the troll avoidance button :)
|
|
May 14, 2017, 04:54:36 AM Last edit: May 14, 2017, 05:20:13 AM by freedomno1 |
|
Now how they will spend their hard earned hacking money, considering the addresses are known and probably are blacklisted everywhere?
Putting the coins through a mixing service most likely. Would say they mix the coins a few times before they move the coins to an exchange to convert them into alt-coins or cash then repeat the cycle and so that no one can follow the route. Either that or sell them to someone in person/generate new wallet keys before mixing them. That or buy giftcards
|
Believing in Bitcoins and it's ability to change the world
|
|
|
RoommateAgreement
|
|
May 14, 2017, 04:58:50 AM |
|
Now how they will spend their hard earned hacking money, considering the addresses are known and probably are blacklisted everywhere?
Putting the coins through a mixing service most likely. the simplest way is using a real anon cryptocurrency not bitcoin which is not anonymous. the best thing that can be found is Monero (XMR) and they most probably will use that in their route, convert to monero > reach anonymity convert to fiat. and eventually they will switch to asking for that coin in first place.
|
Buying the dip...
|
|
|
Herbert2020
Legendary
Offline
Activity: 1946
Merit: 1137
|
|
May 14, 2017, 05:05:41 AM |
|
to OP: you don't need to update the balance each time it receives a transaction, there are so many cool tools for it use this one: [img]http://btc-priceimg.herokuapp.com/balance/<address>/<color>[/img]
replace <address> with address and <color> (html-like hex code) is not needed but is an option to change the color of the text. ref: https://btc-priceimg.herokuapp.com/example:
|
Weak hands have been complaining about missing out ever since bitcoin was $1 and never buy the dip. Whales are those who keep buying the dip.
|
|
|
MysticOne
Jr. Member
Offline
Activity: 59
Merit: 10
|
|
May 14, 2017, 05:20:27 AM |
|
UPDATE: 02:15 GMT Address 1: 39 transactions = 6.97303882 BTC Address 2: 30 transactions = 3.64134512 BTC Address 3: 35 transactions = 5.00218759 BTC EDIT: How could an address grow in transactions and shrink in total BTC when no withdrawals have taken place? (see address #3) Are you sure address 3 had 6.5235 btc in it at that time? I am seeing only 5.50119801 in it at this time. 🙃
|
|
|
|
NeuroticFish
Legendary
Offline
Activity: 3808
Merit: 6512
Looking for campaign manager? Contact icopress!
|
|
May 14, 2017, 06:42:18 AM |
|
Are you sure address 3 had 6.5235 btc in it at that time? I am seeing only 5.50119801 in it at this time. 🙃
Maybe some transactions got double spent / dropped? Although who the heck would pay ransomware from the start when they know to double spend?!
|
|
|
|
iamTom123
|
|
May 14, 2017, 06:48:02 AM |
|
Do people really not back up their files regularly? I would assume that a huge part of the reason the thieves aren't getting as much money as we'd expect is because most people back up their files at least every month or so. Institutions should back up their files much more regularly than that. Unless there's very significant new sensitive information that needs decrypting, there's not much reason for people to pay such a big ransom. If it was $20 instead, I would probably pay it anyway, but there's really no point.
This and many other lessons of this recent attack should be shared to all people and firms who can be subjected to the same thing later. This is now a new form of terrorism and on the side of the hackers/programmers can be a good source of money via Bitcoin. I am sure this will not be the last and in fact can be inducing more attacks in varying degrees and forms in the coming months and years. We should be careful and maybe NSA should be spending more time, focus and resources on this one.
|
|
|
|
Qartada
|
|
May 14, 2017, 07:32:39 AM |
|
Now how they will spend their hard earned hacking money, considering the addresses are known and probably are blacklisted everywhere?
Putting the coins through a mixing service most likely. the simplest way is using a real anon cryptocurrency not bitcoin which is not anonymous. the best thing that can be found is Monero (XMR) and they most probably will use that in their route, convert to monero > reach anonymity convert to fiat. and eventually they will switch to asking for that coin in first place. It's quite a bit harder to exchange fiat for Monero. People would have to go through Bitcoin themselves before they buy Monero and it would be a lot of inconvenience on top of the cost of the ransom which might give them an incentive not to pay it. The thieves, however, can just take the Bitcoin through mixers into Shapeshift and take Monero out, then start exchanging that back into fiat. As I recall there are services that accept Monero and then pay Bitcoin addresses with the value of the Monero you sent them, so they could connect to a LocalBitcoins user or something that way. It shouldn't be hard to exploit Monero's anonymity for it.
|
|
|
|
eckmar
Legendary
Offline
Activity: 1878
Merit: 1038
Telegram: https://t.me/eckmar
|
|
May 14, 2017, 08:36:53 AM |
|
If it was $20 instead, I would probably pay it anyway, but there's really no point.
Yes, that's why they don't really target individuals. But if they've found a couple of sloppy companies, jackpot! There have to be more than 3 addresses. And it's Saturday, many companies cannot access their money until the banks open Monday. Only then we'll see how big the damage is... Do you really think that those big companies that are affected by the virus will be paying bitcoins to decrypt their infected files? I think they just get specialist to remove the ransomware, but I am not sure if that is even possible with this big infection from last week. Big companies have insurances for the event like this that will probably pay this for them...
|
|
|
|
coinits (OP)
Legendary
Offline
Activity: 1582
Merit: 1019
011110000110110101110010
|
|
May 14, 2017, 12:26:39 PM |
|
UPDATE: 02:15 GMT Address 1: 39 transactions = 6.97303882 BTC Address 2: 30 transactions = 3.64134512 BTC Address 3: 35 transactions = 5.00218759 BTC EDIT: How could an address grow in transactions and shrink in total BTC when no withdrawals have taken place? (see address #3) UPDATE: May 14, 2017 12:25 GMT Address 1: 47 transactions = 8.4448838 BTC Address 2: 35 transactions = 4.0009201 BTC Address 3: 42 transactions = 5.83614653 BTC
|
Jump you fuckers! | The thing about smart motherfuckers is they sound like crazy motherfuckers to dumb motherfuckers. | My sig space for rent for 0.01 btc per week.
|
|
|
joshy23
|
|
May 14, 2017, 01:10:05 PM |
|
Now how they will spend their hard earned hacking money, considering the addresses are known and probably are blacklisted everywhere?
Putting the coins through a mixing service most likely. Next logical step maybe is to try to talk to this mixing services and to not let them used their services. But I doubt any agency specially UK and USA will do this for the sake of capturing the culprit. Or maybe the mixing services will do their own action, so that they can't used any exchange to convert the bitcoin they stole to fiat. Its like releasing the bitcoin wallet to all exchanges so that it will be blacklisted.
|
|
|
|
rifiuti
|
|
May 14, 2017, 02:38:58 PM |
|
Almost $32k received based on the current btc rate.
|
|
|
|
wxa7115
|
|
May 14, 2017, 03:08:03 PM |
|
Do people really not back up their files regularly?
I would assume that a huge part of the reason the thieves aren't getting as much money as we'd expect is because most people back up their files at least every month or so. Institutions should back up their files much more regularly than that.
Unless there's very significant new sensitive information that needs decrypting, there's not much reason for people to pay such a big ransom. If it was $20 instead, I would probably pay it anyway, but there's really no point.
No people never backup their files, and a lot of business don’t do it either, they should do it but they don’t, I’m not an expert on computers by any means but sometimes friends ask me to fix their computers and that is one of the first questions I ask and the answer is always no.
|
|
|
|
BlackPanda
Legendary
Offline
Activity: 1414
Merit: 1001
|
|
May 14, 2017, 03:10:54 PM |
|
This is one very bad crime. They are washing the data and then forcing it to do a transaction with bitcoin. This can make bitcoin less trustworthy. Just imagine they use bitcoin for crime.
|
|
|
|
deisik
Legendary
Offline
Activity: 3500
Merit: 1280
English ⬄ Russian Translation Services
|
|
May 14, 2017, 03:39:06 PM |
|
Do you really think that those big companies that are affected by the virus will be paying bitcoins to decrypt their infected files? I think they just get specialist to remove the ransomware, but I am not sure if that is even possible with this big infection from last week If the files are encrypted, that will be next to impossible (as others have said already) Regarding big companies paying the ransom, it doesn't as much depend on the size of the company as on the importance of files encrypted, though it would be strange for a big company not to regularly backup their important data. As the saying goes, there are two kinds of people, those who create backups and those who don't yet. Apart from that, how many big names have been really affected by this piece of ransomware? Almost $32k received based on the current btc rate.
That's nothing in terms of impact on Bitcoin price
|
|
|
|
pixie85
|
|
May 14, 2017, 03:54:06 PM |
|
Almost $32k received based on the current btc rate.
That's nothing in terms of impact on Bitcoin price I'd say that's a fair amount of money for making an encrypting trojan. It paid well for the time they spent making it, especially well since they left an easy to find way to shut it all down. Also I don't think the price decreased purely because of this hack. It didn't target the Bitcoin network, so there was no reason to panic and the price was peaking for days. People were waiting to take their profits.
|
|
|
|
User365
Sr. Member
Offline
Activity: 434
Merit: 251
physics, mathematics and engineering
|
|
May 14, 2017, 03:58:52 PM |
|
WannaCry 2.0 is out and, guess what there is no killswitch anymore If you wanna protect against such threats, check out https://bitcointalk.org/index.php?topic=1903071.msg18888453#msg18888453Its impossible to get infected with WannaCry if you follow the whole guide
|
[could be your ad]
|
|
|
streazight
|
|
May 14, 2017, 07:11:38 PM |
|
As compare to a massive world wide attack, the amount collected so far is not as much as it should be. I also wonder if the people after paying the ransom, were there computer back to normal or still they remain affected by virus ? The virus made the files encrypted and then it will decrypted once you pay $300 as a ransom. To help reducing further spreading of the ransomware possible measurement should be taken to avoid opening unknown emails and especially the one related to invoice.
|
|
|
|
deisik
Legendary
Offline
Activity: 3500
Merit: 1280
English ⬄ Russian Translation Services
|
|
May 14, 2017, 07:27:31 PM |
|
Almost $32k received based on the current btc rate.
That's nothing in terms of impact on Bitcoin price I'd say that's a fair amount of money for making an encrypting trojan. It paid well for the time they spent making it, especially well since they left an easy to find way to shut it all down. Also I don't think the price decreased purely because of this hack. It didn't target the Bitcoin network, so there was no reason to panic and the price was peaking for days. People were waiting to take their profits. Well, we don't know that for sure Maybe, they didn't pay anything at all and just stole the code from the Alphabet agency (maybe, it was one of their employees or something to that tune). We don't know either if they will be caught but if they do get caught eventually, no amount of profit will be worth it unless they get off cheaply while extorting literally millions of dollars (like Cryptsy scammers did). Regarding Bitcoin prices, I'm never tired to repeat that with higher price we should expect higher volatility, even in relative terms, so the price swings of 200 dollars shouldn't surprise anyone any more. My best bet is for 1,200 dollars as a new support level and 2,000 dollars as a new resistance level
|
|
|
|
lite
Legendary
Offline
Activity: 1400
Merit: 1009
|
|
May 14, 2017, 07:36:36 PM |
|
Do people really not back up their files regularly?
No, they're too lazy to do it! i keep most of my files on external hdd and some important files on google drive(automatic sync) and i don't use windows. why isn't ETH demanded as ransom? leave bitcoin alone.
|
|
|
|
unamis76
Legendary
Offline
Activity: 1512
Merit: 1012
|
|
May 14, 2017, 07:39:54 PM Last edit: May 15, 2017, 11:02:34 AM by unamis76 |
|
Addresses are a little over 20 BTC. Never thought they'd see this much money, actually... Question: Once you pay the ransom, how does the hacker know it was you who paid?
I missed that part. I mean people are sending their BTC to them. How are they tying the payment to the computer?
I was questioning myself exactly this. Maybe the ransomware has a place to input txid?
|
|
|
|
|