Bitcoin Forum
November 08, 2024, 06:40:15 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they strongly believe that the creator of this topic is a scammer. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: « 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 [134] 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 276 »
  Print  
Author Topic: LTCgear.com, the best scrypt/scrypt n/X11 cloud mining service, Not paying!!!  (Read 361385 times)
kapetan
Full Member
***
Offline Offline

Activity: 165
Merit: 100


View Profile WWW
December 23, 2014, 10:49:41 PM
 #2661

i propose

login only with Https protocol !
https://ltcgear.com/

change login password and put something difficult
use a password generator or something

and of course change your btc and ltc wallet adreess lockdown will start
STATUS: Payment lockdown in action for another 22 hour(s)

monitor your shares if missing
and your btc and ltc address time to time for any changes

also consider mail password change (login only with Https protocol !)
dont open strange mails

and scan your pc with an antivirus for keyloggers or something suspicious
also consider second antivirus for extra security like HitmanPro , Panda Cloud Cleaner and Malwarebytes Anti-Malware

also we will wait for Chris announcement about this



1. BTCjam: Mining and trading loan #4 https://goo.gl/rwj84u , 2. Scrypt.cc Cloud Mining with 120 Days ROI http://goo.gl/LXomWh ,
3. Haas Bot Trade your Cryptos http://goo.gl/unM0TF , 4. Bitgold Invest to BTC & Gold http://goo.gl/7T3K6O
ThinkI
Member
**
Offline Offline

Activity: 65
Merit: 10


View Profile
December 23, 2014, 11:34:14 PM
 #2662

The mass changing of the addresses, combined with no lockdown on the accounts point towards a direct database injection (also known as SQL Injection). Chris mentioned that he will be doing some migrating on the website, that of course includes databases migrating. I highly doubt this was malicious database injection and most likely the actuall reason is an error during the migration or some wrong command executed.

Yes the scale of the 'attack' suggests 3 options
1) Hacker using data injection as opper says.

2) Hacker with direct access to the database (data injection does not require direct access). This occurs when one or more of the software stack has been successfully attacked and the hacker can gain full control. Probably inserted control panel code into the admin section of the web site so he/she can do what ever he/she likes when he/she likes until it is removed. Given the software stack has probably not been upgraded for 2 years this is quite a likely scenario.

3) defaulting of the addresses by admin (deliberate or not)

For 1 and 2 Payment has to stop until the hack is removed. If Chris is working from a snap shot of the accounts then he can still payout this week but next week he has to fix the hack.

The hack is quite likely since the hacker has not been paid for his work yet. Lets hope its option 3, though, and its accidental.


Earn DevCoins by doing stuff you enjoy! Cool
BTC: 1AxYGFDnnw1PUo8TbQ83PCrenjQJBYU41Z | DVC: 1HKK5tswf8mXGsQng5naNEeqY44ZTHD3MY
Is this the best way to mine BitCoin?
djm34
Legendary
*
Offline Offline

Activity: 1400
Merit: 1050


View Profile WWW
December 24, 2014, 12:33:46 AM
 #2663

The mass changing of the addresses, combined with no lockdown on the accounts point towards a direct database injection (also known as SQL Injection). Chris mentioned that he will be doing some migrating on the website, that of course includes databases migrating. I highly doubt this was malicious database injection and most likely the actuall reason is an error during the migration or some wrong command executed.

Yes the scale of the 'attack' suggests 3 options
1) Hacker using data injection as opper says.

2) Hacker with direct access to the database (data injection does not require direct access). This occurs when one or more of the software stack has been successfully attacked and the hacker can gain full control. Probably inserted control panel code into the admin section of the web site so he/she can do what ever he/she likes when he/she likes until it is removed. Given the software stack has probably not been upgraded for 2 years this is quite a likely scenario.

3) defaulting of the addresses by admin (deliberate or not)

For 1 and 2 Payment has to stop until the hack is removed. If Chris is working from a snap shot of the accounts then he can still payout this week but next week he has to fix the hack.

The hack is quite likely since the hacker has not been paid for his work yet. Lets hope its option 3, though, and its accidental.


not sure if the hacker scenario is plausible.
I have an account I created and never used, it has no share, never received any payment (so totally unknown from the outside), but still the btc address was changed (I had put a btc address) the ltc address which I left blank was left blank after the changed.
(As I didn't access this account last week, the account went into lock down when I logged in. )

So, unless the hacker have accessed to the full database, they wouldn't have any way of knowing and altering this account.
(unless I am mistaken on how they would proceed)
That's why I think it is Chris who reset somehow the accounts.

djm34 facebook page
BTC: 1NENYmxwZGHsKFmyjTc5WferTn5VTFb7Ze
Pledge for neoscrypt ccminer to that address: 16UoC4DmTz2pvhFvcfTQrzkPTrXkWijzXw
dyask
Hero Member
*****
Offline Offline

Activity: 854
Merit: 510


View Profile
December 24, 2014, 01:01:13 AM
 #2664

The mass changing of the addresses, combined with no lockdown on the accounts point towards a direct database injection (also known as SQL Injection). Chris mentioned that he will be doing some migrating on the website, that of course includes databases migrating. I highly doubt this was malicious database injection and most likely the actuall reason is an error during the migration or some wrong command executed.

Yes the scale of the 'attack' suggests 3 options
1) Hacker using data injection as opper says.

2) Hacker with direct access to the database (data injection does not require direct access). This occurs when one or more of the software stack has been successfully attacked and the hacker can gain full control. Probably inserted control panel code into the admin section of the web site so he/she can do what ever he/she likes when he/she likes until it is removed. Given the software stack has probably not been upgraded for 2 years this is quite a likely scenario.

3) defaulting of the addresses by admin (deliberate or not)

For 1 and 2 Payment has to stop until the hack is removed. If Chris is working from a snap shot of the accounts then he can still payout this week but next week he has to fix the hack.

The hack is quite likely since the hacker has not been paid for his work yet. Lets hope its option 3, though, and its accidental.


not sure if the hacker scenario is plausible.
I have an account I created and never used, it has no share, never received any payment (so totally unknown from the outside), but still the btc address was changed (I had put a btc address) the ltc address which I left blank was left blank after the changed.
(As I didn't access this account last week, the account went into lock down when I logged in. )

So, unless the hacker have accessed to the full database, they wouldn't have any way of knowing and altering this account.
(unless I am mistaken on how they would proceed)
That's why I think it is Chris who reset somehow the accounts.

Thanks for sharing, that is good to know.
zerocoder
Full Member
***
Offline Offline

Activity: 252
Merit: 100


View Profile
December 24, 2014, 01:33:18 AM
 #2665

Somebody changed my BTC and LTC addresses and we don't even know who this Chris guy is, we have no evidence to track that guy, we don't even have an address. So what will happen now, just re changed my btc and ltc addresses but that's bullshit. Seems like that ponzi collapse Sad

"Break the Big Banks" - http://BERN.cash - #‎NotMeUS #rEVOLution
BERN BRpJhL4VVsJPwVnHc26iqG3kxxKtF6UEFo
davidwpenny
Newbie
*
Offline Offline

Activity: 37
Merit: 0


View Profile
December 24, 2014, 01:43:50 AM
 #2666

Somebody changed my BTC and LTC addresses and we don't even know who this Chris guy is, we have no evidence to track that guy, we don't even have an address. So what will happen now, just re changed my btc and ltc addresses but that's bullshit. Seems like that ponzi collapse Sad

then get out while you can.
ThinkI
Member
**
Offline Offline

Activity: 65
Merit: 10


View Profile
December 24, 2014, 01:51:33 AM
 #2667

The mass changing of the addresses, combined with no lockdown on the accounts point towards a direct database injection (also known as SQL Injection). Chris mentioned that he will be doing some migrating on the website, that of course includes databases migrating. I highly doubt this was malicious database injection and most likely the actuall reason is an error during the migration or some wrong command executed.

Yes the scale of the 'attack' suggests 3 options
1) Hacker using data injection as opper says.

2) Hacker with direct access to the database (data injection does not require direct access). This occurs when one or more of the software stack has been successfully attacked and the hacker can gain full control. Probably inserted control panel code into the admin section of the web site so he/she can do what ever he/she likes when he/she likes until it is removed. Given the software stack has probably not been upgraded for 2 years this is quite a likely scenario.

3) defaulting of the addresses by admin (deliberate or not)

For 1 and 2 Payment has to stop until the hack is removed. If Chris is working from a snap shot of the accounts then he can still payout this week but next week he has to fix the hack.

The hack is quite likely since the hacker has not been paid for his work yet. Lets hope its option 3, though, and its accidental.


not sure if the hacker scenario is plausible.
I have an account I created and never used, it has no share, never received any payment (so totally unknown from the outside), but still the btc address was changed (I had put a btc address) the ltc address which I left blank was left blank after the changed.
(As I didn't access this account last week, the account went into lock down when I logged in. )

So, unless the hacker have accessed to the full database, they wouldn't have any way of knowing and altering this account.
(unless I am mistaken on how they would proceed)
That's why I think it is Chris who reset somehow the accounts.

Thanks for sharing, that is good to know.

On the other hand, changing all the addresses to false ones, is a good way to see which accounts are active and which are not. Active ones get their addresses updated and then get their payouts. Inactive accounts get ignored/ email sent to user to activate (change the address) again. Hacked accounts will not payout to hackers. The hackers, like us, have no idea what is going on.
 
Now that would be put a positive spin on the whole thing...

Earn DevCoins by doing stuff you enjoy! Cool
BTC: 1AxYGFDnnw1PUo8TbQ83PCrenjQJBYU41Z | DVC: 1HKK5tswf8mXGsQng5naNEeqY44ZTHD3MY
Is this the best way to mine BitCoin?
david123
Legendary
*
Offline Offline

Activity: 1022
Merit: 1004


View Profile
December 24, 2014, 01:56:44 AM
 #2668

Somebody changed my BTC and LTC addresses and we don't even know who this Chris guy is, we have no evidence to track that guy, we don't even have an address. So what will happen now, just re changed my btc and ltc addresses but that's bullshit. Seems like that ponzi collapse Sad

then get out while you can.
I'm still buying at .000375 Wink
blg42598
Hero Member
*****
Offline Offline

Activity: 867
Merit: 1000


View Profile
December 24, 2014, 02:01:56 AM
 #2669

Anyone want to buy 2 BTC worth of Asic shares? I really need 2 BTC.
zerocoder
Full Member
***
Offline Offline

Activity: 252
Merit: 100


View Profile
December 24, 2014, 02:03:17 AM
 #2670

Somebody changed my BTC and LTC addresses and we don't even know who this Chris guy is, we have no evidence to track that guy, we don't even have an address. So what will happen now, just re changed my btc and ltc addresses but that's bullshit. Seems like that ponzi collapse Sad

then get out while you can.
I'm still buying at .000375 Wink

That's a nice offer. OK. So for 6000 shares you are going to pay 2.25 BTC am I right?

"Break the Big Banks" - http://BERN.cash - #‎NotMeUS #rEVOLution
BERN BRpJhL4VVsJPwVnHc26iqG3kxxKtF6UEFo
david123
Legendary
*
Offline Offline

Activity: 1022
Merit: 1004


View Profile
December 24, 2014, 02:08:41 AM
 #2671

I'll pm you
jfabritz
Full Member
***
Offline Offline

Activity: 141
Merit: 100

Cryptocoin Dabbler


View Profile
December 24, 2014, 02:29:53 AM
 #2672

On the other hand, changing all the addresses to false ones, is a good way to see which accounts are active and which are not. Active ones get their addresses updated and then get their payouts. Inactive accounts get ignored/ email sent to user to activate (change the address) again. Hacked accounts will not payout to hackers. The hackers, like us, have no idea what is going on.
 
Now that would be put a positive spin on the whole thing...

Yes, that would be a slick way to determine which accounts are still being actively maintained. If he went back to auto-payout, any account with the 'default' addresses will get skipped for future review.

However, it would be good for Chris to send emails to everyone letting them know to go back and double-check their account.
bones
Sr. Member
****
Offline Offline

Activity: 248
Merit: 250


View Profile
December 24, 2014, 07:19:41 AM
 #2673

Ive still not been paid so logged into my account.

My payment address was changed, so I set it back to my address.
The one it was changed to was not a unused one, so not sure if Chris had anything to do with it or not.
It was   1Nigp9grmwYGyU3Qt8vsaKeaksEsf8bzcQ

At least my payment was not sent to that address so Im sure Ill get it in time.
How do you tell when your acc is in lockdown? I know mine should be, but I see no ticker / timer.

Happy holidays to you all.


hashpower
Newbie
*
Offline Offline

Activity: 59
Merit: 0


View Profile
December 24, 2014, 08:05:45 AM
 #2674

Maintenance
Posted on December 24, 2014 by Chris in Uncategorized

Web server will be place in maintenance mode for about one hour at 12:00 UTC.

I really wonder if this site will ever be back online again..........

i have fallen in a couple of ponzi schemes and i must admit this one looks as well although i really really hope i am wrong.
i have way to many shares to loose here. Sad
cagrund
Legendary
*
Offline Offline

Activity: 1372
Merit: 1000


CTO für den Bundesverband Bitcoin e. V.


View Profile WWW
December 24, 2014, 09:01:15 AM
 #2675

Hmm, Server is in "Short Maintenance" since 9:00 UTC.

mm5aes
Full Member
***
Offline Offline

Activity: 176
Merit: 100


View Profile
December 24, 2014, 09:04:01 AM
 #2676

Hmm, Server is in "Short Maintenance" since 9:00 UTC.
It's fine here? Must have missed it  Wink
copychicken
Hero Member
*****
Offline Offline

Activity: 784
Merit: 1000

Pools Of Honor


View Profile
December 24, 2014, 09:45:09 AM
 #2677

if the database is messed...then its too difficult, to find a fast way of solving...it will probably take weeks to clear things out...


 
 
 
 
██████████████████████████████████████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████████▄▄▄███████████████████████
███████████████████████████████████████████████████████████████████████▀▀▀████████████████████████
██████████████████████████████████████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████████████████████████████████████████
 
 



...INTRODUCING WAVES........
...ULTIMATE ASSET/CUSTOM TOKEN BLOCKCHAIN PLATFORM...






ThinkI
Member
**
Offline Offline

Activity: 65
Merit: 10


View Profile
December 24, 2014, 11:47:02 AM
 #2678

Going back to the instructions not to use TOR.

The only hackers interested in hacking TOR that I know of, are governments.

Anyone know any different?

Earn DevCoins by doing stuff you enjoy! Cool
BTC: 1AxYGFDnnw1PUo8TbQ83PCrenjQJBYU41Z | DVC: 1HKK5tswf8mXGsQng5naNEeqY44ZTHD3MY
Is this the best way to mine BitCoin?
mm5aes
Full Member
***
Offline Offline

Activity: 176
Merit: 100


View Profile
December 24, 2014, 11:54:28 AM
 #2679

Going back to the instructions not to use TOR.

The only hackers interested in hacking TOR that I know of, are governments.

Anyone know any different?

Use mr google to search for 'tor exit node vulnerability'
Here's a start.
http://hackertarget.com/tor-exit-node-visualization/
pbleak
Legendary
*
Offline Offline

Activity: 924
Merit: 1001


View Profile
December 24, 2014, 12:57:58 PM
 #2680

Well it's past the downtime listed on the site. Anybody know what's up?
Pages: « 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 [134] 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 276 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!