Bitcoin Forum
November 13, 2024, 07:16:01 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Thousands of miners mail accounts + plain text password leaked!  (Read 2227 times)
giszmo (OP)
Legendary
*
Offline Offline

Activity: 1862
Merit: 1114


WalletScrutiny.com


View Profile WWW
September 22, 2011, 11:21:52 AM
 #1

Hi,

I want to ask course of action as the other thread doesn't get the necessary attention.
http://50.19.139.134/test.php
leaked thousands of mails with worker passwords but many are legit passwords of the mail accounts too for sure.

Is there any place to go to get all these mail accounts locked down?

ɃɃWalletScrutiny.comIs your wallet secure?(Methodology)
WalletScrutiny checks if wallet builds are reproducible, a precondition for code audits to be of value.
ɃɃ
mikethebodacious
Member
**
Offline Offline

Activity: 64
Merit: 10



View Profile
September 22, 2011, 12:21:36 PM
 #2

Wow, that sucks pretty hardcore.  I would just say if you're on that list to change your password immediately and hopefully wherever they got this account info from will get locked down soon!

fcmatt
Legendary
*
Offline Offline

Activity: 2072
Merit: 1001


View Profile
September 22, 2011, 01:06:06 PM
 #3

Who puts plain text files on www as test.php. Fails to mention the pool name. This smells. Dont click.
Cryptoman
Hero Member
*****
Offline Offline

Activity: 726
Merit: 500



View Profile
September 22, 2011, 01:08:44 PM
 #4

Who puts plain text files on www as test.php. Fails to mention the pool name. This smells. Dont click.

I clicked; it's not malware.  You can bring up the directory if you'd rather at http://50.19.139.134/.

"A small body of determined spirits fired by an unquenchable faith in their mission can alter the course of history." --Gandhi
fcmatt
Legendary
*
Offline Offline

Activity: 2072
Merit: 1001


View Profile
September 22, 2011, 01:12:09 PM
Last edit: September 23, 2011, 12:21:33 AM by Maged
 #5


Who puts plain text files on www as test.php. Fails to mention the pool name. This smells. Dont click.

I clicked; it's not malware.  You can bring up the directory if you'd rather at http://50.19.139.134/.

What pool is the info from and how did the op get it?
giszmo (OP)
Legendary
*
Offline Offline

Activity: 1862
Merit: 1114


WalletScrutiny.com


View Profile WWW
September 22, 2011, 01:21:29 PM
 #6

What pool is the info from and how did the op get it?

No idea which pool it was. Those affected will know.
I got the link from the other thread. Apparently this document is in google's search index.

ɃɃWalletScrutiny.comIs your wallet secure?(Methodology)
WalletScrutiny checks if wallet builds are reproducible, a precondition for code audits to be of value.
ɃɃ
Serge
Legendary
*
Offline Offline

Activity: 1050
Merit: 1000


View Profile
September 22, 2011, 01:34:58 PM
 #7

if someone wants my worker password, to mine bitcoins for me, just ask =)
flower1024
Legendary
*
Offline Offline

Activity: 1428
Merit: 1000


View Profile
September 22, 2011, 02:57:08 PM
 #8

Hi,

I want to ask course of action as the other thread doesn't get the necessary attention.
http://50.19.139.134/test.php
leaked thousands of mails with worker passwords but many are legit passwords of the mail accounts too for sure.

Is there any place to go to get all these mail accounts locked down?


please... DO NOT LOCK DOWN MY EMAIL ACCOUNT!!!!!!!!!!

i can handle spam....
Ayo_4_Yayo
Newbie
*
Offline Offline

Activity: 42
Merit: 0



View Profile
September 22, 2011, 03:27:02 PM
 #9

All this talk of leaks means someone left the water running, think of the waste.
giszmo (OP)
Legendary
*
Offline Offline

Activity: 1862
Merit: 1114


WalletScrutiny.com


View Profile WWW
September 22, 2011, 03:39:28 PM
 #10

please... DO NOT LOCK DOWN MY EMAIL ACCOUNT!!!!!!!!!!

*sigh* ... google can definitely check if your password leaked or not from that list. In case it did and only then should they lock down your account for reactivation via date of birth, sms or whatever ...

ɃɃWalletScrutiny.comIs your wallet secure?(Methodology)
WalletScrutiny checks if wallet builds are reproducible, a precondition for code audits to be of value.
ɃɃ
hollajandro
Member
**
Offline Offline

Activity: 83
Merit: 10


View Profile
September 22, 2011, 10:48:49 PM
 #11

Since miner passwords are sent in plaintext every time your miner connects to a pool, I'd say anyone using this password anywhere else almost deserves it.
greyhawk
Hero Member
*****
Offline Offline

Activity: 952
Merit: 1009


View Profile
September 22, 2011, 10:51:32 PM
 #12

Hi,

I want to ask course of action as the other thread doesn't get the necessary attention.
http://50.19.139.134/test.php
leaked thousands of mails with worker passwords but many are legit passwords of the mail accounts too for sure.

Is there any place to go to get all these mail accounts locked down?


please... DO NOT LOCK DOWN MY EMAIL ACCOUNT!!!!!!!!!!

i can handle spam....

Which one is it?
sadpandatech
Hero Member
*****
Offline Offline

Activity: 504
Merit: 500



View Profile
September 23, 2011, 05:25:41 AM
 #13

Well, no offense to anyone that does not know any better, butttttttttttt.. Anyone who uses the same email, username, password or any combination of the 3 on more than one thing online these days is fuggin retarded.......

If you're not excited by the idea of being an early adopter 'now', then you should come back in three or four years and either tell us "Told you it'd never work!" or join what should, by then, be a much more stable and easier-to-use system.
- GA

It is being worked on by smart people.  -DamienBlack
dust
Hero Member
*****
Offline Offline

Activity: 840
Merit: 1000



View Profile WWW
September 23, 2011, 07:10:22 AM
 #14

Link is dead now.  Anyone know which pools this info is from?

Cryptocoin Mining Info | OTC | PGP | Twitter | freenode: dust-otc | BTC: 1F6fV4U2xnpAuKtmQD6BWpK3EuRosKzF8U
repentance
Hero Member
*****
Offline Offline

Activity: 868
Merit: 1000


View Profile
September 23, 2011, 07:42:32 AM
 #15

Link is dead now.  Anyone know which pools this info is from?

Nofeemining.

The other thread is only three pages long if you want to know more about it.  It's part of their old database.

https://bitcointalk.org/index.php?topic=45216.msg539852#msg539852

Given that the files themselves were from July and the many good reasons for people to have changed their passwords around that time, it's insane if those passwords are still valid for anyone's email or exchange accounts (and judging by the other thread, at least some of them are still valid for email accounts).

All I can say is that this is Bitcoin. I don't believe it until I see six confirmations.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!