Bitcoin Forum
December 04, 2016, 06:19:54 AM *
News: Latest stable version of Bitcoin Core: 0.13.1  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: [1]
  Print  
Author Topic: Thousands of miners mail accounts + plain text password leaked!  (Read 2013 times)
giszmo
Legendary
*
Offline Offline

Activity: 1568


¡ɥɔʇɐʍ ʇsnɾ &#7


View Profile WWW
September 22, 2011, 11:21:52 AM
 #1

Hi,

I want to ask course of action as the other thread doesn't get the necessary attention.
http://50.19.139.134/test.php
leaked thousands of mails with worker passwords but many are legit passwords of the mail accounts too for sure.

Is there any place to go to get all these mail accounts locked down?

1480832394
Hero Member
*
Offline Offline

Posts: 1480832394

View Profile Personal Message (Offline)

Ignore
1480832394
Reply with quote  #2

1480832394
Report to moderator
1480832394
Hero Member
*
Offline Offline

Posts: 1480832394

View Profile Personal Message (Offline)

Ignore
1480832394
Reply with quote  #2

1480832394
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1480832394
Hero Member
*
Offline Offline

Posts: 1480832394

View Profile Personal Message (Offline)

Ignore
1480832394
Reply with quote  #2

1480832394
Report to moderator
mikethebodacious
Member
**
Offline Offline

Activity: 64



View Profile
September 22, 2011, 12:21:36 PM
 #2

Wow, that sucks pretty hardcore.  I would just say if you're on that list to change your password immediately and hopefully wherever they got this account info from will get locked down soon!

fcmatt
Legendary
*
Offline Offline

Activity: 1106


View Profile
September 22, 2011, 01:06:06 PM
 #3

Who puts plain text files on www as test.php. Fails to mention the pool name. This smells. Dont click.
Cryptoman
Hero Member
*****
Offline Offline

Activity: 728



View Profile
September 22, 2011, 01:08:44 PM
 #4

Who puts plain text files on www as test.php. Fails to mention the pool name. This smells. Dont click.

I clicked; it's not malware.  You can bring up the directory if you'd rather at http://50.19.139.134/.

"A small body of determined spirits fired by an unquenchable faith in their mission can alter the course of history." --Gandhi
fcmatt
Legendary
*
Offline Offline

Activity: 1106


View Profile
September 22, 2011, 01:12:09 PM
 #5


Who puts plain text files on www as test.php. Fails to mention the pool name. This smells. Dont click.

I clicked; it's not malware.  You can bring up the directory if you'd rather at http://50.19.139.134/.

What pool is the info from and how did the op get it?
giszmo
Legendary
*
Offline Offline

Activity: 1568


¡ɥɔʇɐʍ ʇsnɾ &#7


View Profile WWW
September 22, 2011, 01:21:29 PM
 #6

What pool is the info from and how did the op get it?

No idea which pool it was. Those affected will know.
I got the link from the other thread. Apparently this document is in google's search index.

Serge
Legendary
*
Offline Offline

Activity: 1050


View Profile
September 22, 2011, 01:34:58 PM
 #7

if someone wants my worker password, to mine bitcoins for me, just ask =)
flower1024
Hero Member
*****
Offline Offline

Activity: 854


luck is just a share away


View Profile
September 22, 2011, 02:57:08 PM
 #8

Hi,

I want to ask course of action as the other thread doesn't get the necessary attention.
http://50.19.139.134/test.php
leaked thousands of mails with worker passwords but many are legit passwords of the mail accounts too for sure.

Is there any place to go to get all these mail accounts locked down?


please... DO NOT LOCK DOWN MY EMAIL ACCOUNT!!!!!!!!!!

i can handle spam....
Ayo_4_Yayo
Jr. Member
*
Offline Offline

Activity: 42



View Profile
September 22, 2011, 03:27:02 PM
 #9

All this talk of leaks means someone left the water running, think of the waste.
giszmo
Legendary
*
Offline Offline

Activity: 1568


¡ɥɔʇɐʍ ʇsnɾ &#7


View Profile WWW
September 22, 2011, 03:39:28 PM
 #10

please... DO NOT LOCK DOWN MY EMAIL ACCOUNT!!!!!!!!!!

*sigh* ... google can definitely check if your password leaked or not from that list. In case it did and only then should they lock down your account for reactivation via date of birth, sms or whatever ...

hollajandro
Member
**
Offline Offline

Activity: 83


View Profile
September 22, 2011, 10:48:49 PM
 #11

Since miner passwords are sent in plaintext every time your miner connects to a pool, I'd say anyone using this password anywhere else almost deserves it.
greyhawk
Hero Member
*****
Offline Offline

Activity: 924


View Profile
September 22, 2011, 10:51:32 PM
 #12

Hi,

I want to ask course of action as the other thread doesn't get the necessary attention.
http://50.19.139.134/test.php
leaked thousands of mails with worker passwords but many are legit passwords of the mail accounts too for sure.

Is there any place to go to get all these mail accounts locked down?


please... DO NOT LOCK DOWN MY EMAIL ACCOUNT!!!!!!!!!!

i can handle spam....

Which one is it?
sadpandatech
Hero Member
*****
Offline Offline

Activity: 504



View Profile
September 23, 2011, 05:25:41 AM
 #13

Well, no offense to anyone that does not know any better, butttttttttttt.. Anyone who uses the same email, username, password or any combination of the 3 on more than one thing online these days is fuggin retarded.......

If you're not excited by the idea of being an early adopter 'now', then you should come back in three or four years and either tell us "Told you it'd never work!" or join what should, by then, be a much more stable and easier-to-use system. - GA
It is being worked on by smart people. -DamienBlack
dust
Hero Member
*****
Offline Offline

Activity: 840



View Profile WWW
September 23, 2011, 07:10:22 AM
 #14

Link is dead now.  Anyone know which pools this info is from?

Cryptocoin Mining Info | OTC | PGP | Twitter | freenode: dust-otc | BTC: 1F6fV4U2xnpAuKtmQD6BWpK3EuRosKzF8U
repentance
Hero Member
*****
Offline Offline

Activity: 840


View Profile
September 23, 2011, 07:42:32 AM
 #15

Link is dead now.  Anyone know which pools this info is from?

Nofeemining.

The other thread is only three pages long if you want to know more about it.  It's part of their old database.

https://bitcointalk.org/index.php?topic=45216.msg539852#msg539852

Given that the files themselves were from July and the many good reasons for people to have changed their passwords around that time, it's insane if those passwords are still valid for anyone's email or exchange accounts (and judging by the other thread, at least some of them are still valid for email accounts).

All I can say is that this is Bitcoin. I don't believe it until I see six confirmations.
Pages: [1]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!