Bitcoin Forum
November 10, 2024, 05:08:01 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3] 4 5 6 7 »  All
  Print  
Author Topic: DIRECT DOWNLOAD LINK FOR LEAKED MT. GOX ACCOUNT DATABASE (CSV FILE)  (Read 36691 times)
IlbiStarz
Full Member
***
Offline Offline

Activity: 336
Merit: 100



View Profile
June 19, 2011, 09:52:00 PM
 #41

Maybe this file is actually a virus/keylogger that will steal your wallet.dat or find your new password once Mt.Gox comes up again? That's the only thing from preventing me from downloading this file.

Really tempted tho...

Or maybe im just stupid/paranoid.
Chick (OP)
Member
**
Offline Offline

Activity: 70
Merit: 10


View Profile
June 19, 2011, 09:54:07 PM
 #42

Maybe this file is actually a virus/keylogger that will steal your wallet.dat or find your new password once Mt.Gox comes up again? That's the only thing from preventing me from downloading this file.

Really tempted tho...

Or maybe im just stupid/paranoid.

Dude, its a fucking CSV file. Check the extension, open the URL up in Google Docs if you're too scared. Tongue

WiseOldOwl
Full Member
***
Offline Offline

Activity: 238
Merit: 100



View Profile
June 19, 2011, 10:02:53 PM
 #43

I am not able to get the file, has it been removed or am i just having problems on my end
cypherdoc
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
June 19, 2011, 10:04:58 PM
 #44

is there a way to "search" this csv list for my username instead of scrolling 60K names?
killer2021
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
June 19, 2011, 10:07:04 PM
 #45

I changed my password the other day when someone said the account was hacked.

Anonymous Cash-By-Mail Exchange: https://www.bitcoin2cash.com
1H6mqgB6UcqKt2SrCmhjxUp9np1Xrbkdj7
Chick (OP)
Member
**
Offline Offline

Activity: 70
Merit: 10


View Profile
June 19, 2011, 10:08:13 PM
 #46

is there a way to "search" this csv list for my username instead of scrolling 60K names?

Ctrl + Find. I opened it up in Google Docs.

airdata
Hero Member
*****
Offline Offline

Activity: 1148
Merit: 501



View Profile
June 19, 2011, 10:10:01 PM
 #47

Oh... nice.. so much for anonymity

how easy is that password hash to crack?
 

▄▄▄▄███████▄▄▄▄        ▄▄▄▄███████▄▄▄▄        ▄▄▄▄███████▄▄▄▄
▄▄█████████████████▄▄  ▄▄█████████████████▄▄  ▄▄█████████████████▄▄
▄█████████████████████▄▄█████████████████████▄▄█████████████████████▄
██████████▀▀  █████████████████▀      ▀████████████████▀      ▀████████
▄█████████     ████████████████   ▄██▄   ██████████████   ▄██▄   ███████▄
████████████   ███████████████████████   ████████████████████▀   ████████
████████████   █████████████████████▀   ▄██████████████████     █████████
████████████   ███████████████████▀   ▄██████████████████████▄   ████████
▀███████████   █████████████████▀   ▄██████████████████   ▀██▀   ███████▀
███████████   ████████████████          ███████████████▄      ▄████████
▀█████████████████████▀▀█████████████████████▀▀█████████████████████▀
▀▀█████████████████▀▀  ▀▀█████████████████▀▀  ▀▀█████████████████▀▀
▀▀▀▀███████▀▀▀▀        ▀▀▀▀███████▀▀▀▀        ▀▀▀▀███████▀▀▀▀
......swap...Swap, Earn, Bridge, Mint Crypto
& NFT in Multiple Chains
.
...MVP LIVE...
.
MeowMixer
Newbie
*
Offline Offline

Activity: 48
Merit: 0


View Profile
June 19, 2011, 10:12:11 PM
 #48

is there a way to "search" this csv list for my username instead of scrolling 60K names?
ctrl+f
bullox
Full Member
***
Offline Offline

Activity: 131
Merit: 100


View Profile
June 19, 2011, 10:19:30 PM
 #49

so obviously its md5, and the salt is contained within db entry, but what method are they using to get the unicode characters back into hex strings that most password crackers utilize for reversing md5?
Chick (OP)
Member
**
Offline Offline

Activity: 70
Merit: 10


View Profile
June 19, 2011, 10:23:57 PM
 #50

so obviously its md5, and the salt is contained within db entry, but what method are they using to get the unicode characters back into hex strings that most password crackers utilize for reversing md5?

I don't think they're salting their passwords.

I'm using John The Ripper to crack these worthless "123456" md5-crypt passwords.

TheBitMan
Sr. Member
****
Offline Offline

Activity: 280
Merit: 250



View Profile
June 19, 2011, 10:26:11 PM
 #51

I'm a member but I couldn't find mine Huh
Batouzo
Member
**
Offline Offline

Activity: 70
Merit: 10


View Profile
June 19, 2011, 10:30:07 PM
 #52

Which is why we salt passwords before hashing them. It might take seconds to find "monkey" but it'll take ages to find "monkeyefweug#%_#Tsafwef24g" and the user doesn't have to remember that second part. Really if the database is compromised the salt is in there with the hash so it doesn't help much but it DOES at least make it so that two people using the same password won't both be compromised by simply compromising one of them. It also makes "rainbow tables" (giant tables of common passwords and what they hash to) ineffective.

It depends - if (if, I'm not sure how this is in case of mtgox) entire users database was leaked, then usually you also have the salts for each user right there in the database.

On the other hand, if they coded is smartly, they also used extra salt that is only in the source code and not in database  - that one should help indeed.
DeiBellum
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
June 19, 2011, 10:34:21 PM
 #53

So, WTF happened to websites being responsible and hashing emails as well?

Just my .02btc
Otoh
Donator
Legendary
*
Offline Offline

Activity: 3108
Merit: 1166



View Profile
June 19, 2011, 10:35:11 PM
Last edit: June 19, 2011, 11:03:08 PM by Otoh
 #54

I do not know if this is real or fake. However, this is an direct download link that I hosted. Please comment...

http://bit.ly/kE3Q4D

[Edit: Holy shit, this is real. I found my email & password in the CSV. Shit just got real...]

I cant believe that.

This is completely against every privacy consideration that this file is openly distributed.


Sig:
>12y experience in trading.
Donations accepted: 14TeeHy4igXUgfnjXmCFG5MwkcRKZRkprS

Please always do your own due diligence, and consult your financial advisor. Never invest unless you can afford to lose your entire investment.

http://twitter.com/BitcoinAnalyst

lols @ Sig irony

BTC = $c²     My BTC addie = 1otohotohMoQoxHuxLBveQiZcV3Pji3Tc 
Bitstamp Exchange: Referal Code
CHARITY | MY REP | PREDICTION 1 | PREDICTION 2 | PREDICTION 3
TheBitMan
Sr. Member
****
Offline Offline

Activity: 280
Merit: 250



View Profile
June 19, 2011, 10:35:35 PM
 #55

is there a way to "search" this csv list for my username instead of scrolling 60K names?
control+f and type in Smiley
Batouzo
Member
**
Offline Offline

Activity: 70
Merit: 10


View Profile
June 19, 2011, 10:36:54 PM
 #56

so obviously its md5, and the salt is contained within db entry, but what method are they using to get the unicode characters back into hex strings that most password crackers utilize for reversing md5?

Mother of god...

I'm usually coding a web game page (no money) more securely...
Caesium
Hero Member
*****
Offline Offline

Activity: 546
Merit: 500


View Profile
June 19, 2011, 10:37:53 PM
 #57

On the other hand, if they coded is smartly, they also used extra salt that is only in the source code and not in database  - that one should help indeed.

They didn't. My details are in there and I reproduced the hash for my password with the following perl:

#! /usr/bin/perl
$salt = '$1$SALT$'; # this is the at the start of the salted password in the accounts.csv, it's 8 alphanumeric characters
$pw = 'MY_PLAIN_PASSWORD'; # do this on a secure box, you're entering your password into a text editor.
$encpw = crypt($pw, $salt);
print "Encrypted password: $encpw\n";

Observe how the printed hash equals the bit after the salt in the accounts.csv. Thus no hidden salt or trickery.

Tired of annoying signature ads? Ad block for signatures
PGPpfKkx
Hero Member
*****
Offline Offline

Activity: 586
Merit: 501


View Profile
June 19, 2011, 10:38:20 PM
 #58

i changed my pass also yesterday, can someone confirm the hack date???
kjj
Legendary
*
Offline Offline

Activity: 1302
Merit: 1026



View Profile
June 19, 2011, 10:40:48 PM
 #59

I should point out that the site made a change to improve password security at least several months ago.  Any passwords set after that time are secure.

Their biggest fault was not forcing users to update their passwords at that time.

17Np17BSrpnHCZ2pgtiMNnhjnsWJ2TMqq8
I routinely ignore posters with paid advertising in their sigs.  You should too.
F104
Newbie
*
Offline Offline

Activity: 26
Merit: 0



View Profile
June 19, 2011, 10:43:19 PM
 #60

I am not as computer literate as most of you. I have some dumb questions. Please be patient with me.

1. Is the *only* data that has been lost the user names, email and hashed password? Is there any way these people can get at my wallet? (I had nothing at Mt. Gox so I have no worries about that)

2. Can they get at the account from which I sent money to Mt Gox?

3. How could this have happened? I expected a person handling this kind of money would be secured like my bank website. On the other hand, why did everyone trust him?

4. Is Mt. Gox giving any accountability such as taking steps to secure what information has not been lost yet?

5. Luckily I used my Mt Gox password only there. What steps should I take to secure other data I have?

thanks
Pages: « 1 2 [3] 4 5 6 7 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!