Bitcoin Forum
November 04, 2024, 07:37:25 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: How to lose your Bitcoins with CTRL-C CTRL-V [unmoderated]  (Read 286 times)
Vadi2323 (OP)
Legendary
*
Offline Offline

Activity: 2044
Merit: 1231


View Profile
October 22, 2019, 04:49:25 PM
Last edit: October 23, 2019, 02:41:04 PM by Vadi2323
 #1

Since LoyceV deleted my message from his self-moderating topic How to lose your Bitcoins with CTRL-C CTRL-V I write it in the unmoderated topic and add some more information.

I just saw another victim of clipboard hijacker malware.

How it works
1. You select a Bitcoin address, and press CTRL-C.
2. The malware changes the address to an address owned by the hacker/scammer.
3. You press CTRL-V and lose any funds you send.
Even if you check part of the pasted Bitcoin address, chances are the first few characters are the same, and you still won't notice the address was changed.

How to prevent this
1. Don't use Windows, but we both know you're not going to change that.
2. Check the entire address after copy/pasting, and not just the first few (or last few) characters. Check some in the middle too. That's a lot of work, so chances are you won't do that either.
3. I came up with something else: don't copy the entire Bitcoin address, copy only a part, and manually type the last few characters. Even if the malware exchanges the incomplete Bitcoin address by their own, your wallet won't accept the (invalid) address if you've typed a few more characters by yourself.
You'll still need to follow Step 2 after this: check the address!
4. Use copy/paste to verify part of your address. Suppose you want to send funds to address 1PjpEgknyKxQKXtMcYFDym8odkfohFGkui. After copy/pasting, select "yKxQKXtMc" from the pasted address, then press CTRL-C. Then, use CTRL-F followed by CTRL-V to see if the partial address matches the original source of the address. And make sure the source is authentic: email can be spoofed too!
5. I'll add o_e_l_e_o's suggestion here:
Any time I am sending coins from any wallet I physically place the address I know is correct directly from the source, right next to the address I have entered to send to. That usually means either holding my hardware wallet or phone up next to my computer screen, or resizing two windows on my phone or computer to put the two address physically right next to each other. Once you have two addresses which are less than inch apart, its very easy to check the entire address and not just a few characters at the start or end.

Stay vigilant
Check, double check and tripple check before sending funds!


No spam please
I said please Cheesy
I'll remove excessive quotes.

Another one free retelling of the Mastering Bitcoin book, Andreas M. Antonopoulos, the 2nd edition. It is better and more useful to read the original source.



In addition to the fact that this security information for address verification is not new for a long time already, the way of stealing coins using address spoofing is not new and has long known.

In addition, hackers have already abandoned this method, since they are not happy with stealing just one transaction, usually not exactly with much value, their goal now is to steal everything what there is. To do this, modern hackers use more sophisticated methods, such as stealing private keys and intercepting web sessions. And as a rule, the final goal justifies the time spent.

Therefore, in connection with the foregoing, I suppose that with the example that inspired LoyceV to create a new topic with stale advice, something is wrong. And it’s strange that there the person checked only the beginning of the address before sending. Nobody has been doing so for a long time - everyone checks the beginning and the end. The described example of "another victim of clipboard hijacker malware" is a regular bullshit, it is not clear for what purpose it was written.
Bttzed03
Legendary
*
Offline Offline

Activity: 2114
Merit: 1150


https://bitcoincleanup.com/


View Profile
October 23, 2019, 10:35:54 AM
 #2

Can you provide a reference/s on the methods used by these modern hackers?


I'm hoping this doesn't turn into some topics that we usually see in reputation board.
GSpgh
Sr. Member
****
Offline Offline

Activity: 532
Merit: 302


View Profile
October 23, 2019, 11:43:44 AM
 #3

If there are other other types of attacks, that doesn't make clipboard malware any more dangerous, especially for less experienced users. You can make your point about other attacks without confrontation with LoyceV - there is space for both of you on this board.
Vadi2323 (OP)
Legendary
*
Offline Offline

Activity: 2044
Merit: 1231


View Profile
October 23, 2019, 12:28:55 PM
Last edit: October 23, 2019, 02:41:34 PM by Vadi2323
 #4

Can you provide a reference/s on the methods used by these modern hackers?

I have already written, read carefully please:


I also recommend reading this topic: https://bitcointalk.org/index.php?topic=3077537.msg31729867#msg31729867 At the moment, this is the most comprehensive and reliable topic about hacker methods against cryptocurrency owners. If you do not want to read everything, read these 2 posts:

I'm hoping this doesn't turn into some topics that we usually see in reputation board.

The topic is not moderated, so if signature spamming starts, it will be lock.

LeGaulois
Copper Member
Legendary
*
Offline Offline

Activity: 2940
Merit: 4101


Top Crypto Casino


View Profile
October 23, 2019, 12:51:53 PM
 #5

Can you provide a reference/s on the methods used by these modern hackers?


Google is available in your country. It's like asking how people get hacked on the www generally, there are many ways. By "modern hackers" he was referring to the trendy methods.. But once the machine is infected:
i.e: they scan your hard drive to find something looking like "wallet.dat". Then they upload the file, extract the keys
i.e: Getting access to the RPC functionality used by the wallet software...

etc, etc.


█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
Bttzed03
Legendary
*
Offline Offline

Activity: 2114
Merit: 1150


https://bitcoincleanup.com/


View Profile
October 23, 2019, 02:10:02 PM
 #6

The link redirects mo to LoyceV's original post and not to the more sophisticated methods these modern hackers use which is what I was asking.


I also recommend reading this topic: https://bitcointalk.org/index.php?topic=3077537.msg31729867#msg31729867 At the moment, this is the most comprehensive and reliable topic about hacker methods against cryptocurrency owners. If you do not want to read everything, read these 2 posts:
I will have to translate this but thanks.


I'm hoping this doesn't turn into some topics that we usually see in reputation board.
The topic is not moderated, so if signature spamming starts, it will be lock.
I should have been more specific. I'm not referring to the spam but the back and forth personal attacks.




Can you provide a reference/s on the methods used by these modern hackers?

Google is available in your country. It's like asking how people get hacked on the www generally, there are many ways. By "modern hackers" he was referring to the trendy methods.. But once the machine is infected:
i.e: they scan your hard drive to find something looking like "wallet.dat". Then they upload the file, extract the keys
i.e: Getting access to the RPC functionality used by the wallet software...

etc, etc.
Yes of course. I could also ask google but since OP mentioned of those sophisticated methods, I got curious as to what he/she was referring to and so I asked.

Thanks for adding information.
Vadi2323 (OP)
Legendary
*
Offline Offline

Activity: 2044
Merit: 1231


View Profile
October 23, 2019, 02:44:08 PM
Last edit: October 23, 2019, 03:18:56 PM by Vadi2323
Merited by Bttzed03 (1)
 #7

The link redirects mo to LoyceV's original post and not to the more sophisticated methods these modern hackers use which is what I was asking.

https://bits.media/istoriya-vzloma-ot-sergey-simanovsky/

Strange, some kind of forum glitch. I checked it out several times yesterday, the link was correct. Corrected.

Google is available in your country. It's like asking how people get hacked on the www generally, there are many ways. By "modern hackers" he was referring to the trendy methods.. But once the machine is infected:
i.e: they scan your hard drive to find something looking like "wallet.dat". Then they upload the file, extract the keys
i.e: Getting access to the RPC functionality used by the wallet software...

etc, etc.
Yes of course. I could also ask google but since OP mentioned of those sophisticated methods, I got curious as to what he/she was referring to and so I asked.

Thanks for adding information.

Google will give scattered data and not everything on this topic. But my theme is written by the person (me), who was subject to a hacker attack. You will not found such information in any search engine. Unfortunately, the hacker deleted his messages from the topic, with them it was much more informative.
BrewMaster
Legendary
*
Offline Offline

Activity: 2114
Merit: 1293


There is trouble abrewing


View Profile
October 23, 2019, 03:39:34 PM
 #8

you say "hackers have already abandoned this method" as if there is only one group who decides which method should be used and which shouldn't!

when a hacking method is invented and it can successfully "hack" people, and then it becomes known, everyone else would also start doing it. soon enough you see a lot of the same malware being created and spread by lots of malicious people.
in other words calling the advice "stale" doesn't make any sense since the method is still very much in use.

There is a FOMO brewing...
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!