Bitcoin Forum
April 25, 2024, 09:59:18 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Community Thread - How BitcoinTalk Accounts Are Hacked?  (Read 217 times)
i7claufe (OP)
Member
**
Offline Offline

Activity: 378
Merit: 42

AhrvoDEEX FUTURE OF BROKERAGE TRANSACTIONS


View Profile
July 30, 2018, 11:54:45 PM
Last edit: August 01, 2018, 08:00:46 AM by i7claufe
 #1

I am very curious because recently I've seen a massive amount of threads regarding hacked accounts. I've seen different ranks being hacked despite their years of experience in the forum. I was just thinking maybe there are several factors or some stuff that made these people be vulnerable to being scammed or hacked. Meaning that these factors will make those years of experience useless.

I want to see how different users got hacked, then we can differentiate the pattern and procedure these hackers do.
This could be a serious problem so I would greatly appreciate any help from users who were hacked or know someone who was hacked.
It would be great if you guys can share with us your experience then I would edit this first post and quote those experiences. I also suggest make the "experience part" as short and as simple as possible too.

Thanks! Smiley

EDIT:
Here are some of community replies.

Reuse of credentials is likely the most common reason, combined with the lack of 2FA offered on the forum. There are many database breaches (I believe BitcoinTalk also had one in 2015) from many notable sites that people may have had an account on. They would have used the same credentials on BitcoinTalk, and a hacker would have gone through the list of leaked account info and tried it against BitcoinTalk.

I think because of phishing sites like Bitcointalk.to

if you are not careful, you will believe that the domain Bitcointalk.to is the same with Bitcointalk.org but they are different!


Users are not just nicknames in the computer world. They "consist" at least of:
 - themselves (the real persons who sleep, eat etc);
 - their devices (PCs, phones, laptops, tablets, smart TVs smart toasters etc);
 - ways to connect their devices to bitcointalk.org server or any-other-Internet-server (routers, WiFis, DNS etc);
 - public Internet-services related to themselves and bitcointalk.org or any-other-Internet-service.

And almost any of these can be vulnerable.

Themselves. Root of evil in most cases. Here we've got:
 - weak passwords (only lazybones didn't mention the weak passwords);
 - passwords we use for different services (for example, identical password for facebook and for bitcointalk.org, so if facebook account gets hacked, it's highly possible that bitcointalk.org gets hacked too);
 - many fine human qualities like stupidity, nonchalance, curiosity and inattention: passwords written on piece of paper and then sticked to monitors to be shown on youtube-video; "indifference" to URLs of sites where people plan to work with money (phishing, yes); irrepressible aspiration to read messages from tax service that tax service never sends; desire to tell everyone that you're Satoshi Nakamoto engaged in crypto currency - in other words, everything that can be described as "security ignorance".
(I'm sure I didn't mention them all.)

Their devices. Here we've got:
 - poorly protected operation systems: because you need to use Qubes OS but continue to use outdated and unconfigured Windows HP - or because you start everything with "root" privileges (it's better to include in "Themselves" paragraph though);
 - viruses, malwares, keyloggers and other "gifts" for antivirus-free machines (and for users who like to download the super-files from cool site letshackeverythingdotcom);
 - spy sly scripts, applications and browser extensions (which - of course! - they received from the same letshackeverythingdotcom).
(I'm sure I didn't mention them all.)

Methods and devices to connect. Here we've got:
 - our IPs;
 - leaky cheap routers;
 - sincere third-party workers who come to configure our leaky cheap routers;
 - curious neighbors (or curious neighbors' children) who decided to check if they're good hackers or not;
 - public WiFi's, which curious neighbors and their curious children use to check if they at least can "listen" to something that doesn't have a password;
 - poorly protected devices connected to home networks.
(I'm sure I didn't mention them all.)

Public Internet-services. Here we've got:
 - weak passwords for public Internet-services (e-mail, for example);
 - poor protection when you can use better protection (when someone doesn't use the 2fA, right);
 - autologin and "remember my password" - especially when you log in from device using by a bunch of people;
 - trivial security questions in social media or e-mails (for example, someone sets a question "the name of my dear kitty" for his/her social media account - when everybody knows everything about that kitty from his/her posts).
(I'm sure I didn't mention them all.)

We're surrounded, folks.



Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
DarkStar_
Legendary
*
Offline Offline

Activity: 2758
Merit: 3282


View Profile WWW
July 31, 2018, 12:00:24 AM
 #2

Reuse of credentials is likely the most common reason, combined with the lack of 2FA offered on the forum. There are many database breaches (I believe BitcoinTalk also had one in 2015) from many notable sites that people may have had an account on. They would have used the same credentials on BitcoinTalk, and a hacker would have gone through the list of leaked account info and tried it against BitcoinTalk.

taking a break - expect delayed responses
nngella
Member
**
Offline Offline

Activity: 308
Merit: 42


View Profile
July 31, 2018, 12:16:02 AM
 #3

I think because of phishing sites like Bitcointalk.to

if you are not careful, you will believe that the domain Bitcointalk.to is the same with Bitcointalk.org but they are different!

vit05
Hero Member
*****
Offline Offline

Activity: 672
Merit: 526



View Profile
July 31, 2018, 01:02:03 AM
Last edit: July 31, 2018, 03:45:09 AM by vit05
 #4

What is important to note is that many accounts have not been hacked. They are only frozen by some hacking attempt or by an attempt to change the email. As the process of defrosting the account or recovering it is manual and takes a lot of time.

Perhaps more important than 2fa, it would be automatization of the account recovery process. Using a signature from a BTC or pgp address. I think the forum should have an option to directly configure in the profile your BTC addresses and pgp that could never be changed. And only the admin could visualize them in an account recovery situation. Bitmex uses a similar system.
TryNinja
Legendary
*
Offline Offline

Activity: 2814
Merit: 6971



View Profile WWW
July 31, 2018, 03:19:02 AM
 #5

~
I'm pretty sure this is already being worked on.

Give me a few minutes and I will find the PM someone received from theymos where he says that he is developing a system to automatically prove you own an account with your staked address.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
Maus0728
Legendary
*
Offline Offline

Activity: 1890
Merit: 1552


Bitcoin Casino Est. 2013


View Profile
July 31, 2018, 04:03:29 AM
 #6

I'm pretty sure this is already being worked on.

Give me a few minutes and I will find the PM someone received from theymos where he says that he is developing a system to automatically prove you own an account with your staked address.
How long will it take to be implemented? I hope that this system will work when the new bitcointalk forum has been launched. Sending PM thru theymos and Cyrus really eats a lot of time.

███▄▀██▄▄
░░▄████▄▀████ ▄▄▄
░░████▄▄▄▄░░█▀▀
███ ██████▄▄▀█▌
░▄░░███▀████
░▐█░░███░██▄▄
░░▄▀░████▄▄▄▀█
░█░▄███▀████ ▐█
▀▄▄███▀▄██▄
░░▄██▌░░██▀
░▐█▀████ ▀██
░░█▌██████ ▀▀██▄
░░▀███
▄▄██▀▄███
▄▄▄████▀▄████▄░░
▀▀█░░▄▄▄▄████░░
▐█▀▄▄█████████
████▀███░░▄░
▄▄██░███░░█▌░
█▀▄▄▄████░▀▄░░
█▌████▀███▄░█░
▄██▄▀███▄▄▀
▀██░░▐██▄░░
██▀████▀█▌░
▄██▀▀██████▐█░░
███▀░░
TryNinja
Legendary
*
Offline Offline

Activity: 2814
Merit: 6971



View Profile WWW
July 31, 2018, 04:17:20 AM
 #7

How long will it take to be implemented? I hope that this system will work when the new bitcointalk forum has been launched. Sending PM thru theymos and Cyrus really eats a lot of time.
I couldn't find the post. But I'll try better tomorrow.

IIRC, the PM was from ~1 month ago and theymos said that he would try to code it in a few weeks. So it should be out soon. So it will definitely be available in the current forum software (SMF), and not only when the new software comes out.

The problem with the current system is that there is too many PM's and just theymos and Cyrus to check, verify the messages, deal with the members and recover the accounts. And they probably have a lot to do other than spend their day recovering hacked/lost accounts.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
esmanthra
Hero Member
*****
Offline Offline

Activity: 504
Merit: 732


View Profile
July 31, 2018, 08:37:26 AM
 #8

maybe there are several factors or some stuff that made these people be vulnerable

Users are not just nicknames in the computer world. They "consist" at least of:
 - themselves (the real persons who sleep, eat etc);
 - their devices (PCs, phones, laptops, tablets, smart TVs smart toasters etc);
 - ways to connect their devices to bitcointalk.org server or any-other-Internet-server (routers, WiFis, DNS etc);
 - public Internet-services related to themselves and bitcointalk.org or any-other-Internet-service.

And almost any of these can be vulnerable.

Themselves. Root of evil in most cases. Here we've got:
 - weak passwords (only lazybones didn't mention the weak passwords);
 - passwords we use for different services (for example, identical password for facebook and for bitcointalk.org, so if facebook account gets hacked, it's highly possible that bitcointalk.org gets hacked too);
 - many fine human qualities like stupidity, nonchalance, curiosity and inattention: passwords written on piece of paper and then sticked to monitors to be shown on youtube-video; "indifference" to URLs of sites where people plan to work with money (phishing, yes); irrepressible aspiration to read messages from tax service that tax service never sends; desire to tell everyone that you're Satoshi Nakamoto engaged in crypto currency - in other words, everything that can be described as "security ignorance".
(I'm sure I didn't mention them all.)

Their devices. Here we've got:
 - poorly protected operation systems: because you need to use Qubes OS but continue to use outdated and unconfigured Windows HP - or because you start everything with "root" privileges (it's better to include in "Themselves" paragraph though);
 - viruses, malwares, keyloggers and other "gifts" for antivirus-free machines (and for users who like to download the super-files from cool site letshackeverythingdotcom);
 - spy sly scripts, applications and browser extensions (which - of course! - they received from the same letshackeverythingdotcom).
(I'm sure I didn't mention them all.)

Methods and devices to connect. Here we've got:
 - our IPs;
 - leaky cheap routers;
 - sincere third-party workers who come to configure our leaky cheap routers;
 - curious neighbors (or curious neighbors' children) who decided to check if they're good hackers or not;
 - public WiFi's, which curious neighbors and their curious children use to check if they at least can "listen" to something that doesn't have a password;
 - poorly protected devices connected to home networks.
(I'm sure I didn't mention them all.)

Public Internet-services. Here we've got:
 - weak passwords for public Internet-services (e-mail, for example);
 - poor protection when you can use better protection (when someone doesn't use the 2fA, right);
 - autologin and "remember my password" - especially when you log in from device using by a bunch of people;
 - trivial security questions in social media or e-mails (for example, someone sets a question "the name of my dear kitty" for his/her social media account - when everybody knows everything about that kitty from his/her posts).
(I'm sure I didn't mention them all.)

We're surrounded, folks.
mdayonliner
Copper Member
Sr. Member
****
Offline Offline

Activity: 630
Merit: 420


We are Bitcoin!


View Profile
July 31, 2018, 08:43:30 AM
 #9

IIRC, the PM was from ~1 month ago and theymos said that he would try to code it in a few weeks. So it should be out soon. So it will definitely be available in the current forum software (SMF), and not only when the new software comes out.
You realize a number of eye balls are looking at you now?(!)  Smiley

I can not wait to see the outcome. More or less all of us actually worried about the account security and the time it takes to recover.

Be happy be at peace. Looking forward to BTC at $1M
TheBeardedBaby
Legendary
*
Offline Offline

Activity: 2184
Merit: 3134


₿uy / $ell


View Profile
July 31, 2018, 08:53:55 AM
 #10

I had the same thread some weeks ago:
https://bitcointalk.org/index.php?topic=4580261.msg41322921#msg41322921

SFR10
Legendary
*
Offline Offline

Activity: 2982
Merit: 3409


Crypto Swap Exchange


View Profile WWW
July 31, 2018, 12:43:21 PM
Merited by mdayonliner (1)
 #11

Give me a few minutes and I will find the PM someone received from theymos where he says that he is developing a system to automatically prove you own an account with your staked address.
IIRC, the PM was from ~1 month ago and theymos said that he would try to code it in a few weeks. So it should be out soon. So it will definitely be available in the current forum software (SMF), and not only when the new software comes out.
You realize a number of eye balls are looking at you now?(!)  Smiley
Just to help and post the reference "TryNinja" was looking for (in case he/she had difficulty in finding it):

If you have not posted that addy elsewhere, it probably won't be accepted.


We don't actually accept the profile field address unless there's some sort of proof that it's remained unchanged, for that very reason.

I'm working on a new address-staking system which will automatically handle signatures, etc. Might have it ready by the end of the month if nothing else comes up to consume my time.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
mdayonliner
Copper Member
Sr. Member
****
Offline Offline

Activity: 630
Merit: 420


We are Bitcoin!


View Profile
July 31, 2018, 04:22:54 PM
 #12

If you have not posted that addy elsewhere, it probably won't be accepted.


We don't actually accept the profile field address unless there's some sort of proof that it's remained unchanged, for that very reason.

I'm working on a new address-staking system which will automatically handle signatures, etc. Might have it ready by the end of the month if nothing else comes up to consume my time.

Fantastic, thank you.

Be happy be at peace. Looking forward to BTC at $1M
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!