Bitcoin Forum
December 07, 2016, 06:47:34 PM *
News: To be able to use the next phase of the beta forum software, please ensure that your email address is correct/functional.
 
   Home   Help Search Donate Login Register  
Pages: « 1 [2]  All
  Print  
Author Topic: 8 BTC loan request  (Read 2729 times)
Keninishna
Hero Member
*****
Offline Offline

Activity: 551



View Profile WWW
January 27, 2012, 09:55:18 PM
 #21

For an example loan request:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I need a loan for 8 btc
send to: 1QFgyRpGW2oX1JJHZvuaigW4ByDDVSbZVp
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJPIx0fAAoJEKHSMtujN58ELa4H/2oiIfvKLB7s/huM6/PsU8SR
PA86AWofv52xMb6L3iFnvEF+iaotmL43M8Py1FnJPHIQeA6q1xJFHBKVQzR3c1rJ
n2JiuyeZ6h9qtJg5WYeyhpuWZCxbOjyO/fmmhdCzF0pQoHHjKcwtqaR3HqDeYMnP
YK82bNXSMbl2BzHymDdC3Uymu/6/mPd6kcwkvk6E+548WPf2zadlvKvFaeffBJtJ
srxDoXv8fYmT+9pmAmbKVrwQqpMEAPkSmRhJwcLDpOs9Z0Cq2bPiHXFWiAZezB9U
+0cVAU5i2VPzcJrS6hMGM54iEjFaXU30rjKYqqV5PImSfMw11vhEM5BzT4Iwmhg=
=IFlf
-----END PGP SIGNATURE-----
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
theymos
Administrator
Legendary
*
Offline Offline

Activity: 2492


View Profile
January 27, 2012, 09:58:21 PM
 #22

How was your account compromised? Did you have a very weak password?

A few other users claim to have had their accounts compromised today, though these users were just posting useless garbage, not scamming. The attacker seems to come from 83.167.240.*.

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
copumpkin
Donator
Sr. Member
*
Offline Offline

Activity: 266


I'm actually a pineapple


View Profile
January 27, 2012, 10:02:28 PM
 #23

How was your account compromised? Did you have a very weak password?

A few other users claim to have had their accounts compromised today, though these users were just posting useless garbage, not scamming. The attacker seems to come from 83.167.240.*.

I'm not sure if this is legit or not, but this guy also hadn't posted in ages and then suddenly asked for a loan (and got one, sadly, and doesn't seem to have bothered giving any responses to questions after the loan request):

https://bitcointalk.org/index.php?action=profile;u=7110;sa=showPosts
BTC_Bear
B4 Foundation
VIP
Sr. Member
*
Offline Offline

Activity: 364


Best Offense is a Good Defense


View Profile WWW
January 27, 2012, 10:09:28 PM
 #24

well this has taught me to start using a pgp key or something.


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

May I suggest signing your requests with a gpg signature. Then at least they will need to steal your forum password, your computer, your passphrase, and understand how to use gpg.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=2AV+
-----END PGP SIGNATURE-----

Well, the issue there is that there's no strong connection between someone's GPG identity and their forum identity. A scammer could easily generate a new key and sign messages with that. There need to be write-once fields in one's forum profile to set a key identity so nobody can change it after taking control of your account Smiley Of course, depending on how badly compromised the forum gets, they could just change the field in the database and we'd be screwed either way. This is why we need a strong crypto-based decentralized loan/reputation system Smiley


Copumpkin,

 Correct, I falsely assumed they would have a WoT correlation. Which if they didn't, I wouldn't 'loan' to them.


Corporations have been enthroned, An era of corruption in high places will follow and the money power will endeavor to prolong its reign by working on the prejudices of the people until wealth is aggregated in a few hands and the Republic is destroyed. ~Abe Lincoln 1ApJdWUdSWYw8n8HEATYhHXA9EYoRTy7c4
theymos
Administrator
Legendary
*
Offline Offline

Activity: 2492


View Profile
January 27, 2012, 10:19:48 PM
 #25

I'm pretty sure these accounts were compromised, so I've marked them all as scammers:
bitbetter
Gluskab
brunoshady
killer2021
kuba_10
Sjalq
madload

It looks like the attacker is just trying a few super common passwords on a bunch of user accounts.

I'm not sure if this is legit or not, but this guy also hadn't posted in ages and then suddenly asked for a loan (and got one, sadly, and doesn't seem to have bothered giving any responses to questions after the loan request):

https://bitcointalk.org/index.php?action=profile;u=7110;sa=showPosts

He's using very different IP ranges, at least.

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
bitlane
Internet detective
Sr. Member
****
Offline Offline

Activity: 462


I heart thebaron


View Profile
January 27, 2012, 11:12:50 PM
 #26

I'm pretty sure these accounts were compromised, so I've marked them all as scammers:
bitbetter
Gluskab
brunoshady
killer2021
kuba_10
Sjalq
madload

It looks like the attacker is just trying a few super common passwords on a bunch of user accounts.

I'm not sure if this is legit or not, but this guy also hadn't posted in ages and then suddenly asked for a loan (and got one, sadly, and doesn't seem to have bothered giving any responses to questions after the loan request):

https://bitcointalk.org/index.php?action=profile;u=7110;sa=showPosts

He's using very different IP ranges, at least.

...further 'revenge' of the Mt.Gox email/password list again/still ?

Keninishna
Hero Member
*****
Offline Offline

Activity: 551



View Profile WWW
January 28, 2012, 12:17:58 AM
 #27

How was your account compromised? Did you have a very weak password?

A few other users claim to have had their accounts compromised today, though these users were just posting useless garbage, not scamming. The attacker seems to come from 83.167.240.*.

My password was probably medium strength but I haven't changed it since I registered on the forum. So its possible one of the forum leaks had compromised it.
BadBear
v2.0
Administrator
Legendary
*
Offline Offline

Activity: 1652



View Profile WWW
January 28, 2012, 12:23:53 AM
 #28

Just gonna leave this here.
https://lastpass.com/

1Kz25jm6pjNTaz8bFezEYUeBYfEtpjuKRG | PGP: B5797C4F

Tired of annoying signature ads? Ad block for signatures
dree12
Legendary
*
Offline Offline

Activity: 1232



View Profile
January 28, 2012, 01:07:40 AM
 #29

Just gonna leave this here.
https://lastpass.com/

My password is NTFS encryped and stored on my HD, only accessed when I need to log in. I don't see how LastPass will make this any better.
BadBear
v2.0
Administrator
Legendary
*
Offline Offline

Activity: 1652



View Profile WWW
January 28, 2012, 01:50:59 AM
 #30

Just gonna leave this here.
https://lastpass.com/

My password is NTFS encryped and stored on my HD, only accessed when I need to log in. I don't see how LastPass will make this any better.

Then you aren't the target audience for the post   Wink 

1Kz25jm6pjNTaz8bFezEYUeBYfEtpjuKRG | PGP: B5797C4F

Tired of annoying signature ads? Ad block for signatures
theymos
Administrator
Legendary
*
Offline Offline

Activity: 2492


View Profile
January 28, 2012, 06:12:22 AM
 #31

You were right about epii. I found another IP and set of users taken by the attacker:
50.30.33.111
darvil, epii, Clarithium, borito4, tachi641, pharno, Iyeman

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
PatrickHarnett
Hero Member
*****
Offline Offline

Activity: 518



View Profile
January 28, 2012, 06:16:19 AM
 #32

You were right about epii. I found another IP and set of users taken by the attacker:
50.30.33.111
darvil, epii, Clarithium, borito4, tachi641, pharno, Iyeman

Thanks Theymos.
theymos
Administrator
Legendary
*
Offline Offline

Activity: 2492


View Profile
January 28, 2012, 06:44:09 AM
 #33

Two of the people with compromised accounts report that they were using the same password they used on MtGox, so it seems likely that the MtGox list is the source.

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
jake262144
Full Member
***
Offline Offline

Activity: 210


View Profile
January 28, 2012, 12:57:32 PM
 #34

That's an awsome job sieving out the compromised accounts, Theymos. Thumbs up!
Do you think we can we make a warning sticky out of this thread in a more visible place than Meta?


All I can say is, don't re-purpose passwords, damn it! Roll Eyes
At the very least add a pseudo-random suffix to the "core password" if you really can do no better:
Code:
1dJpoorpassword
bB4poorpassword
UxTpoorpassword
...
This approach will save you against a leaked password list being tested across multiple servers. Only three additional characters to remember in this example.

Also, it's not prudent to use the same username everywhere. Not only does this greatly simplify password attacks but it is also a hazard to your internet privacy.
Try adding some variation here as well, k? E.g.
Code:
jim
jimmy
jimbo
...
That significantly raises the bar for any attacker trying to track you across different servers.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!