Bitcoin Forum
April 18, 2014, 05:30:22 AM *
News: Due to the OpenSSL heartbleed bug, changing your forum password is recommended.
 
   Home   Help Search Donate Login Register  
Pages: 1 2 [All]
  Print  
Author Topic: Mt. Gox Hack claims  (Read 4798 times)
itsagas
Jr. Member
*
Offline Offline

Activity: 59


View Profile

Ignore
June 19, 2011, 08:06:01 AM
 #1

This is not me, just came across it on hacker news and thought we should know here.


"
I have hacked into mtgox database. Got a huge number of logins password combos.
Mtgox has fixed the problem now. Too late, cause I've already got the data.
 
Will sell the database for the right price.
Send your offers to:
xxxxxxx@hotmail.com
"

http://news.ycombinator.com/item?id=2670302
http://pastebin.com/ui0nusuZ
1397799022
Hero Member
*
Offline Offline

Posts: 1397799022

View Profile Personal Message (Offline)

Ignore
1397799022
Reply with quote  #2

1397799022
Report to moderator
1397799022
Hero Member
*
Offline Offline

Posts: 1397799022

View Profile Personal Message (Offline)

Ignore
1397799022
Reply with quote  #2

1397799022
Report to moderator
ASIC Scrypt Miners Ship FREE Same-Day - Guaranteed Satisfaction!
Just Enter Code freeshipping at GAWMiners.com
Mining Made Easy
For Everyone

Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1397799022
Hero Member
*
Offline Offline

Posts: 1397799022

View Profile Personal Message (Offline)

Ignore
1397799022
Reply with quote  #2

1397799022
Report to moderator
1397799022
Hero Member
*
Offline Offline

Posts: 1397799022

View Profile Personal Message (Offline)

Ignore
1397799022
Reply with quote  #2

1397799022
Report to moderator
1397799022
Hero Member
*
Offline Offline

Posts: 1397799022

View Profile Personal Message (Offline)

Ignore
1397799022
Reply with quote  #2

1397799022
Report to moderator
1397799022
Hero Member
*
Offline Offline

Posts: 1397799022

View Profile Personal Message (Offline)

Ignore
1397799022
Reply with quote  #2

1397799022
Report to moderator
tito13kfm
Jr. Member
*
Offline Offline

Activity: 42



View Profile

Ignore
June 19, 2011, 08:07:57 AM
 #2

All great hackers use hotmail

iCEBREAKER
Hero Member
*****
Offline Offline

Activity: 630


Bitcoin is the separation of Money and State.


View Profile

Ignore
June 19, 2011, 09:06:29 AM
 #3

This is not me, just came across it on hacker news and thought we should know here.


"
I have hacked into mtgox database. Got a huge number of logins password combos.
Mtgox has fixed the problem now. Too late, cause I've already got the data.
 
Will sell the database for the right price.
Send your offers to:
xxxxxxx@hotmail.com
"

http://news.ycombinator.com/item?id=2670302
http://pastebin.com/ui0nusuZ

OMG, I want it!  Where do I send my bitt-muneez?

*changes mtgox pw*

"Current payment systems simply can’t compete with bitcoin’s fees, security and convenience.  Why spend hundreds of thousands of dollars on bank fees per year and lose hair as money transfers bounce from bank to bank during a wire transfer sometimes taking days to reach its destination, when it can clear within minutes and for mere pennies?  As a currency, no sovereign can match it.  As a payment system, no financial institution can compete with it.  As a distributed network, no government can stop it."     -Chris Horlacher
bitrebel
Sr. Member
****
Offline Offline

Activity: 364


View Profile

Ignore
June 19, 2011, 09:20:56 AM
 #4

I don't buy it...
and even if I did buy it.....
and I certainly wouldn't pay for it in bitcoins!


Why does Bitrebel have 65+ Ignores?
Because Bitrebel says things that some people do not want YOU to hear.
killer2021
SCAMMER
Member
*****
Offline Offline

Activity: 84


View Profile

Ignore
June 19, 2011, 09:25:56 AM
 #5

regardless, I would change password. Just in case. Takes 1 minute.

Anonymous Cash-By-Mail Exchange: https://www.bitcoin2cash.com
1H6mqgB6UcqKt2SrCmhjxUp9np1Xrbkdj7
triforcelink
Member
**
Offline Offline

Activity: 112



View Profile

Ignore
June 19, 2011, 09:36:45 AM
 #6

Seems appropriate http://forum.bitcoin.org/index.php?topic=19360.0

Isn't it that even if they did manage to get a copy of the user database they would only find the password hashes and not the actual passwords? So if you had a secure password, there is probably nothing to worry about.

moeman
Newbie
*
Offline Offline

Activity: 10


View Profile

Ignore
June 19, 2011, 09:53:06 AM
 #7

I had all the bitcoin I own taken from my account, around 12BTC. I think it may have been a brute-force attack.

I'm a 15 year old student.

I'd love a few donations to get me started:) 1BSwspXjreLxbmehqPZYdPntCYMVxp8dsU
MeSarah
Full Member
***
Offline Offline

Activity: 154


View Profile

Ignore
June 19, 2011, 09:56:15 AM
 #8

Yeah I would suggest changiing the password too. But I think the mtgox would use multi-round hashing to protect stupid people that use 'password' as a password.

I fear nothing! Say it. I fear nothing!

60 GH/s BFL Single SC - Pre-Order Yours Today!
`````` Only $1299.99 - butterflylabs.com ``````
triforcelink
Member
**
Offline Offline

Activity: 112



View Profile

Ignore
June 19, 2011, 09:57:58 AM
 #9

I had all the bitcoin I own taken from my account, around 12BTC. I think it may have been a brute-force attack.
how strong was your password?

Noise
Newbie
*
Offline Offline

Activity: 24



View Profile

Ignore
June 19, 2011, 10:10:15 AM
 #10

If you're using dictionary words - even if there's numbers & capital letters, there's a high chance your password will be found. Hybrid dictionary attacks process a shit ton of passwords/second regardless of how complex the md5 & salt equation is.
MeSarah
Full Member
***
Offline Offline

Activity: 154


View Profile

Ignore
June 19, 2011, 10:35:00 AM
 #11

Multi-round hashing is just a simple loop. For example:

$password = 'shortcut' .$salt;
for($counter=0; $counter < $round; $counter++) {
     $hash = md5($password);
     $password = $hash;
}

60 GH/s BFL Single SC - Pre-Order Yours Today!
`````` Only $1299.99 - butterflylabs.com ``````
hoo2jalu
Member
**
Offline Offline

Activity: 70



View Profile

Ignore
June 19, 2011, 10:36:21 AM
 #12

... I think it may have been a brute-force attack.

Unlikely unless you're sloppy.

To prove the point, 10 bitcoin for each pass for any of these unsalted MD5s:

824cfad07c88261afb4dd3285627887a
73550477b12849b2a4dcd3b0db187415
3e567bcbb2aa5c28c47012b857bf6e48
3709fb6b0e1c0b26ff22a19ae92fd080
9133c451dd761d29943dcc653252e2fa
ff111d6144367b4abd99aa4321b0a618
8602188ef5a05a13afc59c51b395426c
da842aa7c84236d17a04098fa1273f2d

Have fun! ;P

EDIT: alphanumeric only. I'll pay legitimate finds or my name is mud!
hlksis
Newbie
*
Offline Offline

Activity: 23


View Profile

Ignore
June 19, 2011, 11:13:52 AM
 #13

Password changed. (it had been a length of 50 and will now be as well Cheesy)

To be honest I don't care if the account gets hacked since I don't have anything there. (the biggest job is to keep your wallet secure)
SomeoneWeird
Hero Member
*****
Offline Offline

Activity: 602


View Profile

Ignore
June 19, 2011, 03:59:26 PM
 #14

... I think it may have been a brute-force attack.

Unlikely unless you're sloppy.

To prove the point, 10 bitcoin for each pass for any of these unsalted MD5s:

824cfad07c88261afb4dd3285627887a
73550477b12849b2a4dcd3b0db187415
3e567bcbb2aa5c28c47012b857bf6e48
3709fb6b0e1c0b26ff22a19ae92fd080
9133c451dd761d29943dcc653252e2fa
ff111d6144367b4abd99aa4321b0a618
8602188ef5a05a13afc59c51b395426c
da842aa7c84236d17a04098fa1273f2d

Have fun! ;P

EDIT: alphanumeric only. I'll pay legitimate finds or my name is mud!

Challenge accepted.
Wreckus
Newbie
*
Offline Offline

Activity: 27


View Profile

Ignore
June 19, 2011, 04:10:38 PM
 #15

... I think it may have been a brute-force attack.

Unlikely unless you're sloppy.

To prove the point, 10 bitcoin for each pass for any of these unsalted MD5s:

824cfad07c88261afb4dd3285627887a
73550477b12849b2a4dcd3b0db187415
3e567bcbb2aa5c28c47012b857bf6e48
3709fb6b0e1c0b26ff22a19ae92fd080
9133c451dd761d29943dcc653252e2fa
ff111d6144367b4abd99aa4321b0a618
8602188ef5a05a13afc59c51b395426c
da842aa7c84236d17a04098fa1273f2d

Have fun! ;P

EDIT: alphanumeric only. I'll pay legitimate finds or my name is mud!

Challenge accepted.

Rainbow tables exist for 10character alphanumeric... they're only ~320GB.
Twiddle
Newbie
*
Offline Offline

Activity: 11



View Profile

Ignore
June 19, 2011, 04:12:25 PM
 #16

MagicalTux has already responded to these false claims via IRC:

Quote
Code:
22:31 <kardus> MagicalTux; i'm hearing places someone is selling your database, might want to look into that
22:32 <MagicalTux> [22:31:16] <kardus> MagicalTux; i'm hearing places someone is selling your database, might want to look into that <- already saw it, pure FUD (you wouldn't go far anyway, password are encrypted one way with salt)
22:32 <MagicalTux> (and of course salt is random for each user)
22:33 <fiverawr> If it's random for each user, doesn't that mean the database would also store the salt?
22:33 <MagicalTux> it does, and that's perfectly right
22:39 <lolcat> MagicalTux: And you database is leaked?
22:39 <MagicalTux> lolcat: I don't think so
22:40 <lolcat> Should I change my email adress?
22:40 <MagicalTux> lolcat: I see no reason so far, someone claiming they stole the db doesn't mean anything
22:42 <MagicalTux> none of the servers (backup or live) have any suspicious login
22:42 <lolcat> MagicalTux: They couldn't have edited the log?
22:42 <MagicalTux> lolcat: in that case, they could have just taken the bitcoins
22:43 <lolcat> Good point
22:43 <MagicalTux> or taken the access to LR
22:43 <MagicalTux> or to Dwolla
22:43 <MagicalTux> or to the EU bank
SomeoneWeird
Hero Member
*****
Offline Offline

Activity: 602


View Profile

Ignore
June 19, 2011, 04:17:13 PM
 #17

... I think it may have been a brute-force attack.

Unlikely unless you're sloppy.

To prove the point, 10 bitcoin for each pass for any of these unsalted MD5s:

824cfad07c88261afb4dd3285627887a
73550477b12849b2a4dcd3b0db187415
3e567bcbb2aa5c28c47012b857bf6e48
3709fb6b0e1c0b26ff22a19ae92fd080
9133c451dd761d29943dcc653252e2fa
ff111d6144367b4abd99aa4321b0a618
8602188ef5a05a13afc59c51b395426c
da842aa7c84236d17a04098fa1273f2d

Have fun! ;P

EDIT: alphanumeric only. I'll pay legitimate finds or my name is mud!

Challenge accepted.

Rainbow tables exist for 10character alphanumeric... they're only ~320GB.

Exactly my point.
finack
Jr. Member
*
Offline Offline

Activity: 56


View Profile

Ignore
June 19, 2011, 05:12:18 PM
 #18

MagicalTux has already responded to these false claims via IRC:

While I'd agree that it seems likely the offer of the database for sale is a fake and just intended to shake confidence in Mt. Gox given all of the other activity that's going on, MagicalTux's response doesn't instill much confidence. In fact suggesting things like salted hashes would protect the passwords and no suspicious logins found sound exactly like the kinds of reports that come in early from actual intrusion victims. Most salted hash schemes in use won't protect people with weak to crack passwords, which will be about 99% of the users, and a SQL injection compromise which is by far the most likely approach wouldn't involve OS logins. The fact that there was a recently discovered CSRF hole lends credence to the idea that there could easily have been a SQLi. And while he may be playing dumb, he doesn't sound like he has the instrumentation in place that would even necessarily allow him to discover an intrusion like that after the fact, even if he knew what to look for.

So while it's only smart for him to categorically deny any intrusion he doesn't have direct evidence of, and I'd still rate the HN post as much more likely to be fake than real, I'd still personally change my password all the same.  Tux really couldn't give you that advice unless he'd already found and closed a flaw without tanking his business.
DamienBlack
Jr. Member
*
Offline Offline

Activity: 56


View Profile

Ignore
June 19, 2011, 05:27:14 PM
 #19

... I think it may have been a brute-force attack.

Unlikely unless you're sloppy.

To prove the point, 10 bitcoin for each pass for any of these unsalted MD5s:

824cfad07c88261afb4dd3285627887a
73550477b12849b2a4dcd3b0db187415
3e567bcbb2aa5c28c47012b857bf6e48
3709fb6b0e1c0b26ff22a19ae92fd080
9133c451dd761d29943dcc653252e2fa
ff111d6144367b4abd99aa4321b0a618
8602188ef5a05a13afc59c51b395426c
da842aa7c84236d17a04098fa1273f2d

Have fun! ;P

EDIT: alphanumeric only. I'll pay legitimate finds or my name is mud!

Well they aren't in any rainbow tables, so they must be pretty long. Judging by the high reward on this, he probably used 15-20 characters. Enough that you might as well keep your computers mining bitcoins, it could be months even for a very powerful group of computers.

I trade bitcoin options at https://bitoption.org/ ... Join me.
I play poker at https://betco.in/ ... Join me.
Support the bitcoin economy, what do you do?
Tips: 1NfXhiTFEdKQTdLy49s6DYAP1K7MeFWyao
elggawf
Sr. Member
****
Offline Offline

Activity: 308



View Profile

Ignore
June 19, 2011, 05:41:51 PM
 #20

Well they aren't in any rainbow tables, so they must be pretty long. Judging by the high reward on this, he probably used 15-20 characters. Enough that you might as well keep your computers mining bitcoins, it could be months even for a very powerful group of computers.

Rainbow tables != reverse lookup tables.

It's stupid as fuck banking on MD5 - either the plaintext for those hashes is really long and/or not actually alphanumeric, or he's going to be some 80BTC poorer in a couple weeks. If they really are <16 chars, unsalted and alphanumeric, I'd be willing to bet the 80BTC is probably worth more than what you'd spend on some Amazon EC2 instances to break it in a hurry...

It's also stupid as fuck chaining multiple rounds of MD5 together, particularly without changing the salt each time. - I believe you actually make it weaker to rainbow table attacks by doing that... but I'm absolutely no expert in cryptography by any stretch of the imagination.

Regardless, if there's any evidence at all that the DB is taken, assume the passwords are broken. Now where's the credible evidence the DB was taken?

^_^
finack
Jr. Member
*
Offline Offline

Activity: 56


View Profile

Ignore
June 19, 2011, 07:45:20 PM
 #21

Regardless, if there's any evidence at all that the DB is taken, assume the passwords are broken. Now where's the credible evidence the DB was taken?

Quote from: MtGox
UPDATE REGARDING LEAKED ACCOUNT INFORMATIONS

We will address this issue too and prevent logins from each users. Leaked information includes username, email and hashed password, which does not allow anyone to get to the actual password, should it be complex enough. If you used a simple password you will not be able to login on Mt.Gox until you change your password to something more secure. If you used the same password on different places, it is recommended to change it as soon as possible.

oops
jhansen858
Sr. Member
****
Offline Offline

Activity: 322


View Profile

Ignore
June 19, 2011, 07:51:38 PM
 #22

its a trick.. Those are the real passwords just happen to be the same length as a hashed password



Hi forum: 1DDpiEt36VTJsiJunyBc3XtG6CcSAnsQ4p
zerokwel
Sr. Member
****
Offline Offline

Activity: 463


[b][size=14pt][url=https://PrimeDice.com][color=Or


View Profile

Ignore
June 19, 2011, 08:09:06 PM
 #23

yep the DB was leaked and has been confirmed it has 61020 entrys  with your username email address and a hashed password atlest the passwords where not plain text

hoo2jalu
Member
**
Offline Offline

Activity: 70



View Profile

Ignore
June 19, 2011, 11:13:10 PM
 #24

...
Unlikely unless you're sloppy.

To prove the point, 10 bitcoin for each pass for any of these unsalted MD5s:

824cfad07c88261afb4dd3285627887a
73550477b12849b2a4dcd3b0db187415
3e567bcbb2aa5c28c47012b857bf6e48
3709fb6b0e1c0b26ff22a19ae92fd080
9133c451dd761d29943dcc653252e2fa
ff111d6144367b4abd99aa4321b0a618
8602188ef5a05a13afc59c51b395426c
da842aa7c84236d17a04098fa1273f2d
...

Well they aren't in any rainbow tables, so they must be pretty long. Judging by the high reward on this, he probably used 15-20 characters. Enough that you might as well keep your computers mining bitcoins, it could be months even for a very powerful group of computers.

16 character alphanumeric. MD5 can be weak as snot, unsalted, and exposed via SQLi and I don't care.

Don't be sloppy with password management!

All of you re-using passwords between sites, re-using usernames and passwords between pools or miner accounts, re-using same email addresses across forums and exchange accounts, ALL OF YOU ARE ASKING TO GET PWNED!

What will it take for this message to sink in? cracking the MtGox hashes shows the majority of you are still being lazy...
elggawf
Sr. Member
****
Offline Offline

Activity: 308



View Profile

Ignore
June 19, 2011, 11:17:14 PM
 #25

oops

Yeah, that'd do it. That information either wasn't posted, or hadn't caught my attention when I posted before - note there's 2 hours between my post and yours. Wink

^_^
MikesMechanix
Member
**
Offline Offline

Activity: 70



View Profile

Ignore
June 19, 2011, 11:33:37 PM
 #26

Well they aren't in any rainbow tables, so they must be pretty long. Judging by the high reward on this, he probably used 15-20 characters. Enough that you might as well keep your computers mining bitcoins, it could be months even for a very powerful group of computers.

Already at 10 characters alphanumeric, the possible number of combos is 839299365868340224. @5 Ghash/s, it would take over 5 years to go through them all, and each additional character multiplies the time by 62.

Please send your extra Bitcoins to 17miTorGDBUh3yNTYJtodJPw9wzrcNcf6y. Thank you!

Sign up on TradeHill Instant Bitcoin Exchange using this link to get a lifetime 10 % discount on trades!
ISA
Jr. Member
*
Offline Offline

Activity: 48


View Profile

Ignore
June 19, 2011, 11:39:47 PM
 #27

This is not me, just came across it on hacker news and thought we should know here.


"
I have hacked into mtgox database. Got a huge number of logins password combos.
Mtgox has fixed the problem now. Too late, cause I've already got the data.
 
Will sell the database for the right price.
Send your offers to:
xxxxxxx@hotmail.com
"

http://news.ycombinator.com/item?id=2670302
http://pastebin.com/ui0nusuZ

Can I pay in Bitcoins? Smiley

Grouver (BtcBalance)
Hero Member
*****
Offline Offline

Activity: 526



View Profile WWW

Ignore
June 19, 2011, 11:45:02 PM
 #28

Solution to crappy password management

-Create a truecrypt masterkey file: with one sick ass long 50 char pass wich you will save in your mind.  (http://www.truecrypt.org)

-Create a bunch of txt files within in the mounted truecrypt dir with 0 untill 9 digits as filenames.
So:

0.txt
1.txt
2.txt
etc...

-Put in each txt file a generated pass wich is 10 chars minimum.

-Pick a number you like with 3 digits or more.

-Paste each password in the #.txt file behind each other based on the 3 digit code you will remember.


-Go to lastpass.com (www.lastpass.com)

-Download tool.

-Create account

-Use masterkey as master password

-For each website you register in the future... use a 20 digit pass you can generate with lastpass.

-Make a list of all websites you think are important to change the pass.

-Take an hour and change each pass and let lastpass generate one for you.

-Put masterkey file on each hardrive/usb stick you got.

-Done

Pages: 1 2 [All]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!