Bitcoin Forum
May 11, 2024, 05:40:34 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Coinomi BUG or ...?  (Read 373 times)
fer_coinomi
Jr. Member
*
Offline Offline

Activity: 55
Merit: 10


View Profile
July 05, 2020, 07:25:21 AM
Last edit: July 05, 2020, 10:15:35 AM by fer_coinomi
 #21

i just updated yesterday my coinomi desktop wallet ... and like for 3-4 minute the whole coinomi screen with accounts and balance was frozen and in screen appear more than 2,6 million hash and password (i saved all data with the ctrl+c and v function) like

[...]

what you think what was happens? its a bug, what kind of data are this?
Hi pizza50, please open a support ticket at support.coinomi.com explaining in detail what you saw. Explain where exactly did you see that text, how did it appear on the screen, if it was immediately after you ran the updated installer file or when running the app after updating, etc. Please also include a link to the exact file you downloaded and anything else you think is important. The wallet doesn't do anything you described, so most likely you downloaded a fake file from a fake website, or some other software activated as you tried to execute Coinomi. We would love to have a copy if that's the case. But a deeper malware scan and possibly moving your coins to a new recovery phrase using a clean device and subsequent wipe of your computer is recommended.



Do be careful, the first time (when they allegedly sent seeds to Google) they spent loads of time, effort and money to "bury" the guy that uncovered the alleged infractions.
Hi mocacinno, the guy who uncovered the infractions was trying to extort Coinomi from the start, you can read the detailed forensic analysis of the entire thing here: https://twitter.com/kimionis/status/1131945228506738688



To me, this is really weird, because according to what Coinomi says, all user data is only on the user's device, and there is an encrypted application data folder where seed/keys are stored. What interests me is where the user's password is stored? According to this, it turns out that it is located on a Coinomi server that sent everything to one user during an update in some crazy bug Huh

Assuming everything is stored locally, then it is impossible for one program to connect to millions of computers and pull all this data - or is it still possible?
Hi Lucius, the password isn't stored anywhere, and definitely not on our servers. Your app password used to encrypt the wallet data. When the app requires the private keys for any operation, it tries to decrypt the local data with the password. If the decryption is successful, it means the password was correct. If the decryption was not successful, it means the password was wrong. The password itself (or hash or any kind of data derived from it) isn't stored anywhere, not even in your computer.



Not that hosting the executable and the checksum on the same page would be secure.. but at least that's something.
Our website hosts the executable and checksum on the same page, but also has a text file that contains the filenames and their respective hashes, which is signed with our lead dev's PGP key. The chain of trust starts with the signed message and PGP key. Once you verify the signature, you will know which are the legit hashes for each file. Finally you can download the file and check that its hash matches the one on the signed message.
1715449234
Hero Member
*
Offline Offline

Posts: 1715449234

View Profile Personal Message (Offline)

Ignore
1715449234
Reply with quote  #2

1715449234
Report to moderator
1715449234
Hero Member
*
Offline Offline

Posts: 1715449234

View Profile Personal Message (Offline)

Ignore
1715449234
Reply with quote  #2

1715449234
Report to moderator
1715449234
Hero Member
*
Offline Offline

Posts: 1715449234

View Profile Personal Message (Offline)

Ignore
1715449234
Reply with quote  #2

1715449234
Report to moderator
According to NIST and ECRYPT II, the cryptographic algorithms used in Bitcoin are expected to be strong until at least 2030. (After that, it will not be too difficult to transition to different algorithms.)
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715449234
Hero Member
*
Offline Offline

Posts: 1715449234

View Profile Personal Message (Offline)

Ignore
1715449234
Reply with quote  #2

1715449234
Report to moderator
1715449234
Hero Member
*
Offline Offline

Posts: 1715449234

View Profile Personal Message (Offline)

Ignore
1715449234
Reply with quote  #2

1715449234
Report to moderator
1715449234
Hero Member
*
Offline Offline

Posts: 1715449234

View Profile Personal Message (Offline)

Ignore
1715449234
Reply with quote  #2

1715449234
Report to moderator
LoyceV
Legendary
*
Offline Offline

Activity: 3304
Merit: 16637


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
July 05, 2020, 07:41:57 AM
 #22

its a 214 MB file ... as i see some lines are duplicated, i think i have at least 500 k lines
I've received the file. It has 2435570 lines.
Four lines missed an "ENTER", after splitting those lines into two lines, each line was in there exactly 5 times.

After removing duplicates, I have 487115 lines left. It's comforting to know my own Coinomi password isn't in there.
The most common "password"  in there is "Aa123456." with 212904 occurrences. It looks like something based on commonly used passwords.
I would go with this:
Whether it's Coinomi bug or malware that pretends as Coinomi, i think what you should do are :
1. Immediately move your cryptocurrency from Coinomi to another wallet using clean/secure computer
2. Format your storage & reinstall your OS

bitmover
Legendary
*
Offline Offline

Activity: 2296
Merit: 5942


bitcoindata.science


View Profile WWW
July 05, 2020, 11:44:58 PM
 #23

Do be careful, the first time (when they allegedly sent seeds to Google) they spent loads of time, effort and money to "bury" the guy that uncovered the alleged infractions.
Hi mocacinno, the guy who uncovered the infractions was trying to extort Coinomi from the start, you can read the detailed forensic analysis of the entire thing here: https://twitter.com/kimionis/status/1131945228506738688

Hello fer_coinomi

I don't know if all this drama is true or not, however I don't think you should post a twitter link if  you have a forensic analysis. This is not the first time I see someone from coinomi pasting a twitter link as if a tweet were a forensic analysis. It is not. Don't you have a direct link to this forensic analysis? It would certainly give much better credibility to it.

That being said, I use coinomi in my mobile for small amounts and never had problems, so I believe your version might be true, but pasting  a tweet link won't help.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
DaveF
Legendary
*
Offline Offline

Activity: 3472
Merit: 6270


Crypto Swap Exchange


View Profile WWW
July 06, 2020, 01:49:19 AM
Last edit: July 06, 2020, 03:36:35 PM by DaveF
Merited by bitmover (2)
 #24

Do be careful, the first time (when they allegedly sent seeds to Google) they spent loads of time, effort and money to "bury" the guy that uncovered the alleged infractions.
Hi mocacinno, the guy who uncovered the infractions was trying to extort Coinomi from the start, you can read the detailed forensic analysis of the entire thing here: https://twitter.com/kimionis/status/1131945228506738688

Hello fer_coinomi

I don't know if all this drama is true or not, however I don't think you should post a twitter link if  you have a forensic analysis. This is not the first time I see someone from coinomi pasting a twitter link as if a tweet were a forensic analysis. It is not. Don't you have a direct link to this forensic analysis? It would certainly give much better credibility to it.

That being said, I use coinomi in my mobile for small amounts and never had problems, so I believe your version might be true, but pasting  a tweet link won't help.

I think this is what coinomi was referring to:
https://medium.com/@cipherblade/how-not-to-react-when-your-cryptocurrency-is-stolen-92f7c72616af

I think more and more people are just blaming their wallet, when it's something on the PC / Phone or they downloaded the wrong thing.
The electrum vulnerability is 18+ months old and yet people are still getting hit with it.
electrum-bitcoin.org ( https://bitcointalk.org/index.php?topic=5229836 ) is still getting traffic.

So when something like the OP sees something it must be the wallet.
Not some other malware or the fact that they downloaded the wrong thing.

-Dave

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
fer_coinomi
Jr. Member
*
Offline Offline

Activity: 55
Merit: 10


View Profile
July 06, 2020, 06:15:24 AM
 #25

Do be careful, the first time (when they allegedly sent seeds to Google) they spent loads of time, effort and money to "bury" the guy that uncovered the alleged infractions.
Hi mocacinno, the guy who uncovered the infractions was trying to extort Coinomi from the start, you can read the detailed forensic analysis of the entire thing here: https://twitter.com/kimionis/status/1131945228506738688

Hello fer_coinomi

I don't know if all this drama is true or not, however I don't think you should post a twitter link if  you have a forensic analysis. This is not the first time I see someone from coinomi pasting a twitter link as if a tweet were a forensic analysis. It is not. Don't you have a direct link to this forensic analysis? It would certainly give much better credibility to it.

That being said, I use coinomi in my mobile for small amounts and never had problems, so I believe your version might be true, but pasting  a tweet link won't help.
Sorry, the the forensic analysis is linked on the first tweet of that thread that I send. I though that the tweets were also important, so I could take 2 birds with a single link. As noted by DaveF, the direct link to the analysis is https://medium.com/@cipherblade/how-not-to-react-when-your-cryptocurrency-is-stolen-92f7c72616af if you don't want to read the tweets from Coinomi's CEO about this.
BrewMaster
Legendary
*
Offline Offline

Activity: 2114
Merit: 1292


There is trouble abrewing


View Profile
July 06, 2020, 02:46:53 PM
 #26

its a 214 MB file ... as i see some lines are duplicated, i think i have at least 500 k lines
I've received the file. It has 2435570 lines.
Four lines missed an "ENTER", after splitting those lines into two lines, each line was in there exactly 5 times.

After removing duplicates, I have 487115 lines left. It's comforting to know my own Coinomi password isn't in there.
The most common "password"  in there is "Aa123456." with 212904 occurrences. It looks like something based on commonly used passwords.

yeah, to me it also looks more like a rainbow table with a dictionary of the most common passwords and their equivalent salted hashes using MD5 hash algorithm. so it may not exactly be coming from Coinomi but be related to it. possibly a malware on OP's computer tried it but were broken enough to show the table itself!

There is a FOMO brewing...
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!