Pages:
Author

Topic: 135 BTC Stolen from my Deepbit account!!!!!!!! - page 5. (Read 29040 times)

vip
Activity: 1052
Merit: 1155
I still think the most likely is that a browser window was left unattended while logged in.

The strange part is that it was done at about 5:30AM PST (where my office is)
There are lots of cameras at the office that I can check soon, but no one but myself has access at that time of day.

So I suspect it was done somewhere other than at the location of the mining computers.

Are your mining computers on a wireless network?

No,  they are hardwired.
full member
Activity: 126
Merit: 100
I still think the most likely is that a browser window was left unattended while logged in.

The strange part is that it was done at about 5:30AM PST (where my office is)
There are lots of cameras at the office that I can check soon, but no one but myself has access at that time of day.

So I suspect it was done somewhere other than at the location of the mining computers.

Are your mining computers on a wireless network?

Edit: depending of what kind of logging deepbit uses, they maybe able to provide user agents, which in turn may help to narrow your search down
member
Activity: 98
Merit: 10
I hope that people can build extensions of block explorers to watch where these funds get sent and when they get sent to a known entity we can slowly backtrack and narrow down who the scoundrel was who did this.  Bitcoin isn't anonymous as people think---Its got Lojack built in.  Using some good old fashioned Link Analysis, thefts on a grand scale can be monitored.   I'd like to see something built into the Bitcoin user interface that would check a database of reported stolen bitcoins and send an alert when some were received from an address in the database.  We can all be Big Brother collectively.

The Anonymous of Bitcoin. I love it.
vip
Activity: 1052
Merit: 1155
I still think the most likely is that a browser window was left unattended while logged in.

The strange part is that it was done at about 5:30AM PST (where my office is)
There are lots of cameras at the office that I can check soon, but no one but myself has access at that time of day.

So I suspect it was done somewhere other than at the location of the mining computers.
donator
Activity: 826
Merit: 1041
I still think the most likely is that a browser window was left unattended while logged in.
legendary
Activity: 1358
Merit: 1002
I have since changed the password,  and I am currently the only person on the planet who knows it.

Does deepbit have any sort of a log of what IP addresses log into each account?
I think that might be my only chance of having any info at all as to who took my bitcoins.
If the IP address is one in the same town as my business,  I will know the theft was related to one of the employees who knew the password.

If the IP address is in some far off country,  then I know it was just some random hacker.

Any other thoughts on how I can find additional information?

Or someone using a proxy or tor...  Undecided
member
Activity: 61
Merit: 10
A question: Did you use the same password for deepbit login as for submitting the shares from mining client?

Because if did, then anyone who can spy on your HTTP headers (local network users) then can see your password, too.

On deepbit, you can set another password for worker (even the first), but by default, the passwords are the same. Not safe IMHO.


I think you are right about this being my weakest link.

The deepbit screen hides the actual login password, but displays all the passwords for each worker in the client.
Until today,  we used the same password for both.
Multiple people (about ten) in the warehouse could of looked at the screen and noticed the username and password.
I think my only chance is by finding the IP address of the person who logged into my deepbit account.


this is why I like poclbm-gui it also hides the worker password, but thanks for the heads up I wasn't aware of this HTTP header transparency myself
legendary
Activity: 2198
Merit: 1311
My deepbit password is now over 20 characters long with caps and symbols.
That just shortened the time to crack now didn't it?

How so?

Because now you don;t have to waste time searching all the combinations between 1 and 20 characters.

Well, sure.  But you've still got to search through at least all the 20 character combinations and the password is longer than that so it's still a pretty big task.  But, yes, you're right, it'll take less time.  Less time to make a realistic difference?  Probably not.

80 bits is considered safe. 20 characters of letters+numbers make it 20*6=120 bits, an overkill (even if the attacker knows how many bits there are exactly).

That's what I thought, but, hey, apparently I'm a dummy for revealing this personal data on a public forum.
sr. member
Activity: 476
Merit: 250
My deepbit password is now over 20 characters long with caps and symbols.
That just shortened the time to crack now didn't it?

How so?

Because now you don;t have to waste time searching all the combinations between 1 and 20 characters.

Well, sure.  But you've still got to search through at least all the 20 character combinations and the password is longer than that so it's still a pretty big task.  But, yes, you're right, it'll take less time.  Less time to make a realistic difference?  Probably not.

80 bits is considered safe. 20 characters of letters+numbers make it 20*6=120 bits, an overkill (even if the attacker knows how many bits there are exactly).
legendary
Activity: 2198
Merit: 1311
We are not talking about you, but about security practices and how dumb some people are revealing their personal data on public forums without even realizing it

But you are talking about me since I'm the dummy who revealed the personal data that my deepbit password is over 20 characters long.  Now, in a matter of months, if not sooner, any sufficiently crafty scriptkiddie could have access to my deepbit account.

You must be a genius

I must.
vip
Activity: 1052
Merit: 1155
A question: Did you use the same password for deepbit login as for submitting the shares from mining client?

Because if did, then anyone who can spy on your HTTP headers (local network users) then can see your password, too.

On deepbit, you can set another password for worker (even the first), but by default, the passwords are the same. Not safe IMHO.


I think you are right about this being my weakest link.

The deepbit screen hides the actual login password, but displays all the passwords for each worker in the client.
Until today,  we used the same password for both.
Multiple people (about ten) in the warehouse could of looked at the screen and noticed the username and password.
I think my only chance is by finding the IP address of the person who logged into my deepbit account.
full member
Activity: 126
Merit: 100
We are not talking about you, but about security practices and how dumb some people are revealing their personal data on public forums without even realizing it

But you are talking about me since I'm the dummy who revealed the personal data that my deepbit password is over 20 characters long.  Now, in a matter of months, if not sooner, any sufficiently crafty scriptkiddie could have access to my deepbit account.

You must be a genius
legendary
Activity: 2198
Merit: 1311
We are not talking about you, but about security practices and how dumb some people are revealing their personal data on public forums without even realizing it

But you are talking about me since I'm the dummy who revealed the personal data that my deepbit password is over 20 characters long.  Now, in a matter of months, if not sooner, any sufficiently crafty scriptkiddie could have access to my deepbit account.
full member
Activity: 126
Merit: 100
We are not talking about you, but about security practices and how dumb some people are revealing their personal data on public forums without even realizing it
legendary
Activity: 2198
Merit: 1311
My deepbit password is now over 20 characters long with caps and symbols.
That just shortened the time to crack now didn't it?

How so?

Because now you don;t have to waste time searching all the combinations between 1 and 20 characters.

Well, sure.  But you've still got to search through at least all the 20 character combinations and the password is longer than that so it's still a pretty big task.  But, yes, you're right, it'll take less time.  Less time to make a realistic difference?  Probably not.

Yes it will. With some clever social engineering, dumpster diving and few good gpus in skilled hands your password would probably be broken in couple of months if not sooner

Well, I guess I've just made myself a target and I'm as good as screwed.
full member
Activity: 126
Merit: 100
My deepbit password is now over 20 characters long with caps and symbols.
That just shortened the time to crack now didn't it?

How so?

Because now you don;t have to waste time searching all the combinations between 1 and 20 characters.

Well, sure.  But you've still got to search through at least all the 20 character combinations and the password is longer than that so it's still a pretty big task.  But, yes, you're right, it'll take less time.  Less time to make a realistic difference?  Probably not.

Yes it will. With some clever social engineering, dumpster diving and few good gpus in skilled hands your password would probably be broken in couple of months if not sooner
hero member
Activity: 531
Merit: 505
A question: Did you use the same password for deepbit login as for submitting the shares from mining client?

Because if did, then anyone who can spy on your HTTP headers (local network users) then can see your password, too.

On deepbit, you can set another password for worker (even the first), but by default, the passwords are the same. Not safe IMHO.
legendary
Activity: 2198
Merit: 1311
My deepbit password is now over 20 characters long with caps and symbols.
That just shortened the time to crack now didn't it?

How so?

Because now you don;t have to waste time searching all the combinations between 1 and 20 characters.

Well, sure.  But you've still got to search through at least all the 20 character combinations and the password is longer than that so it's still a pretty big task.  But, yes, you're right, it'll take less time.  Less time to make a realistic difference?  Probably not.
vip
Activity: 1386
Merit: 1136
The Casascius 1oz 10BTC Silver Round (w/ Gold B)
I hope that people can build extensions of block explorers to watch where these funds get sent and when they get sent to a known entity we can slowly backtrack and narrow down who the scoundrel was who did this.  Bitcoin isn't anonymous as people think---Its got Lojack built in.  Using some good old fashioned Link Analysis, thefts on a grand scale can be monitored.   I'd like to see something built into the Bitcoin user interface that would check a database of reported stolen bitcoins and send an alert when some were received from an address in the database.  We can all be Big Brother collectively.

I think that would make merchants hesitant to accept Bitcoins.  If I were a merchant and had to worry that people's payments had their own paparazzi behind them, that might just make it not worth my while.

The best thing we can do as a community is perhaps buy some memory from him if we need it (or fiber transceivers as he seems to be selling), and be super vigilant down the road, as this stuff is only bound to increase.  More people should be practicing using offline wallets, as keeping significant sums on third party websites or even on networked computers is just begging for eventual problems.
newbie
Activity: 46
Merit: 0
I hope that people can build extensions of block explorers to watch where these funds get sent and when they get sent to a known entity we can slowly backtrack and narrow down who the scoundrel was who did this.  Bitcoin isn't anonymous as people think---Its got Lojack built in.  Using some good old fashioned Link Analysis, thefts on a grand scale can be monitored.   I'd like to see something built into the Bitcoin user interface that would check a database of reported stolen bitcoins and send an alert when some were received from an address in the database.  We can all be Big Brother collectively.
Pages:
Jump to: