Bitcoin Forum
November 03, 2024, 03:28:23 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: A Couple of Questions on Wallet Hackers  (Read 974 times)
peach (OP)
Newbie
*
Offline Offline

Activity: 56
Merit: 0



View Profile
June 27, 2011, 05:13:21 AM
 #1

I realize that getting an unsecured wallet file hacked isn't too rare.

How exactly are people getting these trojans/keyloggers onto their computer? It seems as though every time I see a thread about someone getting hacked they exclaim they do not understand how someone got into their computer.

Also, do you think the latest definitions files for a program like Malwarebytes can detect all of this malware?
gigabytecoin
Sr. Member
****
Offline Offline

Activity: 280
Merit: 252


View Profile
June 27, 2011, 05:43:56 AM
 #2

The malware always infects a few people first before Malwarebytes or a similar company can come up with a "definition" of said malware to search for and exterminate from their machines.

It's not the wallet file that's being "hacked into", it's your computer.

Soon enough there will be much greater security built into Bitcoin. Remember we are still only on version 0.23 beta here!

Whenever I have been "hacked" it is usually from visiting some shady website that has installed a drive by downloading type of program and I have failed to update my browsing software (and am running windows).

Just recently I had purchased a brand new laptop... had some friends over to watch a streaming sports event (shady websites) and had the computer completely infected with a virus and un-operable on the internet within about 3 hours of using it!

I just installed ubuntu and forgot about the whole thing.
sakkaku
Member
**
Offline Offline

Activity: 70
Merit: 10



View Profile WWW
June 29, 2011, 02:05:58 AM
 #3

There are actually hordes upon hordes upon hordes of machines infected with malware.  People are retarded, download files and refuse to update their systems.  The malware has to be analyzed and added to a glorified blacklist for detection and removal as stated above.  You can't easily tell if a program is "good" or "bad".  There isn't enough difference from say a program that uploads your family photos to say one that steals all your credit cards and passwords and uploads them.  Even supposed "whitelist" ecosystems like the iPhone still get malware that leaks user information (geospatial position, ip, etc).

13NiQcetcioQj3YwHL1ZWvgQg8eAjkzUdt
Blog/Projects: zxlu.com | syn-multiminer
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!