Bitcoin Forum
April 20, 2024, 05:58:08 AM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 »  All
  Print  
Author Topic: Is this a security issue? Massive worker un & pw list found through google ...  (Read 4004 times)
strictlyfocused (OP)
Newbie
*
Offline Offline

Activity: 55
Merit: 0


View Profile
September 22, 2011, 01:08:23 PM
 #21

@OP actually you're the dick for posting the link without any attempt to warn those affected.

Fuck you ... how is it my responsibility to do anything about it? What am I gonna do, email everyone on that list a sweet little message? Get real ... I could have just as well done something nefarious with it but I posted it here in hopes of getting it resolved.
1713592688
Hero Member
*
Offline Offline

Posts: 1713592688

View Profile Personal Message (Offline)

Ignore
1713592688
Reply with quote  #2

1713592688
Report to moderator
1713592688
Hero Member
*
Offline Offline

Posts: 1713592688

View Profile Personal Message (Offline)

Ignore
1713592688
Reply with quote  #2

1713592688
Report to moderator
1713592688
Hero Member
*
Offline Offline

Posts: 1713592688

View Profile Personal Message (Offline)

Ignore
1713592688
Reply with quote  #2

1713592688
Report to moderator
Whoever mines the block which ends up containing your transaction will get its fee.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
stsbrad
Full Member
***
Offline Offline

Activity: 168
Merit: 100

Brad Willman, SSCP, LTCP, MCTS,SCE,BCE


View Profile
September 22, 2011, 01:18:24 PM
 #22

http://50.19.139.134/test.php

I found it by simply doing a google search for my email address. I wonder how many people used a password on there that may be to an actual account somewhere else?


can you please let us know exactly what you google
searched? I'm finding this hard to believe
strictlyfocused (OP)
Newbie
*
Offline Offline

Activity: 55
Merit: 0


View Profile
September 22, 2011, 01:22:13 PM
 #23

http://50.19.139.134/test.php

I found it by simply doing a google search for my email address. I wonder how many people used a password on there that may be to an actual account somewhere else?


can you please let us know exactly what you google
searched? I'm finding this hard to believe

As I said in the first post if you had looked, I simply googled my email address ...
giszmo
Legendary
*
Offline Offline

Activity: 1862
Merit: 1105


WalletScrutiny.com


View Profile WWW
September 22, 2011, 01:26:29 PM
 #24

https://encrypted.google.com/#q=redline888%40gmail.com first hit for example ...

ɃɃWalletScrutiny.comIs your wallet secure?(Methodology)
WalletScrutiny checks if wallet builds are reproducible, a precondition for code audits to be of value.
ɃɃ
stsbrad
Full Member
***
Offline Offline

Activity: 168
Merit: 100

Brad Willman, SSCP, LTCP, MCTS,SCE,BCE


View Profile
September 22, 2011, 02:23:59 PM
 #25


Thank you. Sorry to OP for saying I find this hard to believe. I stand corrected.
Gerken
Full Member
***
Offline Offline

Activity: 126
Merit: 100


View Profile
September 22, 2011, 02:26:35 PM
 #26

Just in time, daddy needs a new pair of shoes. 

tonto
Hero Member
*****
Offline Offline

Activity: 609
Merit: 500


View Profile
September 22, 2011, 03:41:38 PM
 #27

oh holy hell, I hope people didn't use these logins/passwords for their mtgox account.  I'm glad I'm not on the list Wink   But if I we're, the only thing I have on mtgox right now is .0034 btc
joeyjoe
Full Member
***
Offline Offline

Activity: 224
Merit: 100


View Profile
September 22, 2011, 03:43:55 PM
 #28

lol! i thought that was my database!

Bitcoin PHP programmer for hire! (HTML / CSS / JQuery / AJAX / .NET).
NoFeeMining
Newbie
*
Offline Offline

Activity: 54
Merit: 0


View Profile
September 22, 2011, 07:08:10 PM
 #29

That was part of our old database.

I have no idea why that information was there and I plan on figuring out which idiot from my team did that.

I am in the process of emailing all the affected users to let them know.

We managed to minimize the damage on our end though only about 1 or 2 coins were lost.
joeyjoe
Full Member
***
Offline Offline

Activity: 224
Merit: 100


View Profile
September 22, 2011, 07:09:29 PM
 #30

That was part of our old database.

I have no idea why that information was there and I plan on figuring out which idiot from my team did that.

I am in the process of emailing all the affected users to let them know.

Very bad security practice to leave the accounts passwords unencrypted, i hope your not the coder for that site!

Would advise all users to get their miners away from there ASAP

Bitcoin PHP programmer for hire! (HTML / CSS / JQuery / AJAX / .NET).
strictlyfocused (OP)
Newbie
*
Offline Offline

Activity: 55
Merit: 0


View Profile
September 22, 2011, 07:11:04 PM
 #31

That was part of our old database.

I have no idea why that information was there and I plan on figuring out which idiot from my team did that.

I am in the process of emailing all the affected users to let them know.

We managed to minimize the damage on our end though only about 1 or 2 coins were lost.

Glad to hear this will be corrected  Smiley
NoFeeMining
Newbie
*
Offline Offline

Activity: 54
Merit: 0


View Profile
September 22, 2011, 07:13:33 PM
 #32

That was part of our old database.

I have no idea why that information was there and I plan on figuring out which idiot from my team did that.

I am in the process of emailing all the affected users to let them know.

Very bad security practice to leave the accounts passwords unencrypted, i hope your not the coder for that site!

Would advise all users to get their miners away from there ASAP

A. We had to keep the WORKER passwords unencrypted so that users could see them and edit them more easily.

B. This is our OLD database on the OLD site. We have since completely rewritten the site's code and it doesn't even use mysql anymore.

C. This happened because one of the guys on the team was doing some debugging and like an idiot did not secure his testing site.
joeyjoe
Full Member
***
Offline Offline

Activity: 224
Merit: 100


View Profile
September 22, 2011, 07:19:25 PM
 #33

That was part of our old database.

I have no idea why that information was there and I plan on figuring out which idiot from my team did that.

I am in the process of emailing all the affected users to let them know.

Very bad security practice to leave the accounts passwords unencrypted, i hope your not the coder for that site!

Would advise all users to get their miners away from there ASAP

A. We had to keep the WORKER passwords unencrypted so that users could see them and edit them more easily.

B. This is our OLD database on the OLD site. We have since completely rewritten the site's code and it doesn't even use mysql anymore.

C. This happened because one of the guys on the team was doing some debugging and like an idiot did not secure his testing site.

Even so, why have them saved as plain text at all? you can still encyrpt with base64 and a salt code that is kept hidden

Bitcoin PHP programmer for hire! (HTML / CSS / JQuery / AJAX / .NET).
iamzill
Sr. Member
****
Offline Offline

Activity: 677
Merit: 250


View Profile
September 23, 2011, 12:49:39 AM
 #34

That was part of our old database.

I have no idea why that information was there and I plan on figuring out which idiot from my team did that.

I am in the process of emailing all the affected users to let them know.

Very bad security practice to leave the accounts passwords unencrypted, i hope your not the coder for that site!

Would advise all users to get their miners away from there ASAP

A. We had to keep the WORKER passwords unencrypted so that users could see them and edit them more easily.

B. This is our OLD database on the OLD site. We have since completely rewritten the site's code and it doesn't even use mysql anymore.

C. This happened because one of the guys on the team was doing some debugging and like an idiot did not secure his testing site.

Even so, why have them saved as plain text at all? you can still encyrpt with base64 and a salt code that is kept hidden
They probably thought worker passwords wasn't "important" enough.
RandyFolds
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250



View Profile
September 23, 2011, 12:57:37 AM
 #35

That was part of our old database.

I have no idea why that information was there and I plan on figuring out which idiot from my team did that.

I am in the process of emailing all the affected users to let them know.

Very bad security practice to leave the accounts passwords unencrypted, i hope your not the coder for that site!

Would advise all users to get their miners away from there ASAP

A. We had to keep the WORKER passwords unencrypted so that users could see them and edit them more easily.

B. This is our OLD database on the OLD site. We have since completely rewritten the site's code and it doesn't even use mysql anymore.

C. This happened because one of the guys on the team was doing some debugging and like an idiot did not secure his testing site.

Even so, why have them saved as plain text at all? you can still encyrpt with base64 and a salt code that is kept hidden
They probably thought worker passwords wasn't "important" enough.


They aren't "important", they are a mere formality.
phantomcircuit
Sr. Member
****
Offline Offline

Activity: 463
Merit: 252


View Profile
September 23, 2011, 01:04:02 AM
 #36

These are passwords from bitcoinpool.com
RandyFolds
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250



View Profile
September 23, 2011, 01:10:21 AM
 #37

These are passwords from bitcoinpool.com

nofeemining, brother. read the thread.
phantomcircuit
Sr. Member
****
Offline Offline

Activity: 463
Merit: 252


View Profile
September 23, 2011, 01:12:33 AM
 #38

These are passwords from bitcoinpool.com

nofeemining, brother. read the thread.

I stand corrected, i noticed a lot of usernames that match bitcoinpool users.
RandyFolds
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250



View Profile
September 23, 2011, 01:14:01 AM
 #39

These are passwords from bitcoinpool.com

nofeemining, brother. read the thread.

I stand corrected, i noticed a lot of usernames that match bitcoinpool users.

I am sure there is plenty of overlap, particularly the hoppers.

I just don't get why anyone sets their miner names/passwords to anything but default...like I said, they are completely arbitrary.
payb.tc
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1000



View Profile
September 23, 2011, 01:18:27 AM
 #40

They aren't "important", they are a mere formality.

problem is, careless people re-use passwords elsewhere like on their email accounts.
Pages: « 1 [2] 3 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!