Pages:
Author

Topic: 90 BTC stolen! - page 4. (Read 14020 times)

hero member
Activity: 784
Merit: 1000
Annuit cœptis humanae libertas
June 06, 2014, 04:21:51 PM
This reminds me of the end of 2013, I think, when people started to randomly get hacked. Good thing you only lost 90BTC. Numerous people lost all of their life savings.

Ah, only BTC90, no big deal then. Grin
sr. member
Activity: 434
Merit: 250
May 18, 2014, 11:39:35 PM
Your coins are pretty much gone. You could try tracking them, but to no avail. Better to count your losses, pick up the pieces and move on.
full member
Activity: 199
Merit: 100
May 15, 2014, 01:02:06 AM
the OP should use something like this, when it becomes open sourced.

https://bitcointalksearch.org/topic/ann-bither-simplesecure-bitcoin-walletdesktop-148-606238
full member
Activity: 222
Merit: 102
May 14, 2014, 12:13:35 PM
Wow, that really sucks! I feel for you man, my condolences.
hero member
Activity: 644
Merit: 500
May 14, 2014, 11:54:43 AM
This reminds me of the end of 2013, I think, when people started to randomly get hacked. Good thing you only lost 90BTC. Numerous people lost all of their life savings.
hero member
Activity: 812
Merit: 500
May 14, 2014, 11:52:34 AM
You just lost 40 000$

COngrats
full member
Activity: 126
Merit: 101
Be Here Now
May 14, 2014, 11:23:17 AM
The question is how the hell would a hacker know I had any to begin with?


I realize there are viruses and whatnot but my question on it was how are people targeted. There is a small number of computer users who even know what bitcoin is...how is a keylogging wallet.dat virus going to know who and what to target - meaning how would the right people (bitcoin owners) get infected to begin with and what prevents 300 million non bitcoin users from being infected with no gain to the hacker, instead of a specific target?

It seems to me that a general all purpose destructive sort of virus is fine for random large distribution via social networks and email, etc. (not fine morally, but fine from the hacker's point of view investing time and energy into programming and releasing it at all) making it a numbers game, but there's a missing piece here between the hacker creating this and knowing where to send it to begin with. What's he scanning? Outer space, or the equivalent of the interwebs, kinda like SETI for bitcoin?

Wouldn't that require an enormous amount of processing effort for a small reward? It'd seem they could put their skills to better use and just do mining and get "free" bitcoin that way.

I guess I'm missing something because it just looks like too small and specific of a base to put out random effort, violating minimum effort/maximum gain when a specific targeted attack would make more sense, but to do so, said hacker has to have a channel somewhere that knows where to find said bitcoin users...outside of hacking an exchange.

Know what I mean? Grin
legendary
Activity: 2632
Merit: 1023
May 14, 2014, 04:55:34 AM
In real life, without being specifically targeted, how common - realistically speaking - is it for bitcoin owners to end up with keyloggers and trojans and malware  specifically programmed to sniff out and steal bitcoin without the user going somewhere specific or downloading something specifically related TO btc in the first place - which would seem rather easy enough to root out.

Sincere questions and observation.

Don't have numbers, but I suspect machine take-over tools may now scan for Bitcoin wallets "just in case". Bitcoin for the first time, allows you to instantly transfer value in an irreversible way: over the Internet. Most online banking involves reversible transactions; and are not nearly as lucrative.

There is also the long-term possibility that trusted giants like Apple, Google, and Microsoft may start installing key loggers for one reason or another (rogue employee, 3-4 letter agency request). The only way to guard against that is to keep the bulk of your funds off-line.


this.

I beleive there is a class of virus software that operates as follows

scan for wallet.dat
if found copy and send off.
waits for the password to be entered.
keylogs and sends password.

it then re-encrypts you local wallet.

A small test amount may be sent.

This allows th hacket to potetinally let you keep filling your wallet with out you realising you have been hacked, unless you were lucky enought to twig the small amount gone.

Then the hacker can elect to clear the wallet, or wait for you to put more in.

It is in hackers interest not to clear the wallet immediately, as that would be obvious and you can't use it at all anymore to withdraw but may keep filling it.

sr. member
Activity: 331
Merit: 250
May 14, 2014, 01:39:30 AM
Armory 0.91.2 will def. solve this problem because they have cold-storage wallet. You should scan for viruses daily if you have that much BTC.

Where did you store your 90 BTC? Bitcoin cloud service?
sgk
legendary
Activity: 1470
Merit: 1002
!! HODL !!
May 14, 2014, 01:30:59 AM
I thought a double-direction arrow and "n/a" in the transaction field in Bitcoin-Qt represented a transaction between addresses within the same wallet?

^^ THIS
legendary
Activity: 1008
Merit: 1001
Let the chips fall where they may.
May 14, 2014, 01:22:17 AM
You should run an antivirus program on your computer to see if there are trojans or malware.

Does not work if your anti-virus provider is pushing the malware updates (or looking the other way).

/tinfoil hat
full member
Activity: 164
Merit: 100
Indie Developer
May 14, 2014, 01:13:46 AM
Now I just want to know how the wallet summary can show a double-direction arrow and a n/a address?

I didn't see anyone answer. I'm pretty sure I have understood this properly:

  • The double arrow is shown when a transaction is made that has inputs other than are in the wallet of the QT you are running. It was created by another client that has your privkey and other privkeys that you don't have.
  • The n/a address is shown when there are more than one output that is not a change address in your own wallet. In the transaction you are mentioning, none of the outputs are likely a change address, so QT can't know which one to show.

This means that if your wallet file was stolen, the thief imported other addresses before they sent, or they are creating transactions with different software that they importet you privkey and other privkeys to.

-OR-

This kind of transaction is actually most likely to be caused by the real owner after he/she has been exporting and importing addresses and been playing around with wallet files. In this case the coins weren't stolen but just transferred by mistake to another address you own. Coins might not be lost after all!

I take the freedom to quote myself because the thread was actually about this question mentioned above. The guy has 2 Bitcoin QT wallets and I think I have solved the puzzle... no hacking invlolved. philipzhai, did you ever find out exactly what happened?
newbie
Activity: 14
Merit: 0
May 14, 2014, 01:13:20 AM
You should run an antivirus program on your computer to see if there are trojans or malware.
full member
Activity: 164
Merit: 100
Indie Developer
May 14, 2014, 01:07:54 AM
Correct me if I'm mistaken here but exchanges trade fiat currency that is easily spent here and now with digital cryptocurrency that's hardly accepted anywhere. And you mean to tell me a hacker is that much of a screaming dumbass he'd steal virtual currency whose value could be $1 three hours after he steals it instead of fiat he could cash out in a hurry?
It's not exactly easy to get away with wire transfers as they are processed hours or days later. Bitcoin is probably more convenient to steal.

These exchanges that popped up - omg we got hacked, *boom* shut down. New one pops up...omg we got hacked too! *boom* shut down. That's the pattern, these new exchanges jump up, claim hackery and bankruptcy and vanish. Sounds to me like someone's full of shit - hackers didn't hack anything, the ones running the exchanges were the real thieves and made off with people's money.

Agreed.
legendary
Activity: 1008
Merit: 1001
Let the chips fall where they may.
May 14, 2014, 01:07:19 AM
In real life, without being specifically targeted, how common - realistically speaking - is it for bitcoin owners to end up with keyloggers and trojans and malware  specifically programmed to sniff out and steal bitcoin without the user going somewhere specific or downloading something specifically related TO btc in the first place - which would seem rather easy enough to root out.

Sincere questions and observation.

Don't have numbers, but I suspect machine take-over tools may now scan for Bitcoin wallets "just in case". Bitcoin for the first time, allows you to instantly transfer value in an irreversible way: over the Internet. Most online banking involves reversible transactions; and are not nearly as lucrative.

There is also the long-term possibility that trusted giants like Apple, Google, and Microsoft may start installing key loggers for one reason or another (rogue employee, 3-4 letter agency request). The only way to guard against that is to keep the bulk of your funds off-line.
full member
Activity: 126
Merit: 101
Be Here Now
May 14, 2014, 12:13:11 AM
With all due respect, yall sound absolutely paranoid as all get out.

User error is likely the first main cause of anyone, n00b or seasoned, losing bitcoin or anything else.

I am curious why it's all focused on hackery though. I recognize malware being what it is but it seems logical to me that for anyone to lose 90btc to theft, (what's that again 38 grand?) they were specifically targeted, which doesn't seem like malware which is more random. Malware might scan for it but it has to have a root somewhere to even know TO scan for it. So would a hacker. I could have 90btc right now (I don't, wish like hell I did though!) and who'd know it? How would a hacker have any idea what I have or where I have it or THAT I have anything at all? Seems like random scans are a serious waste of processing power for x number of computers whose users don't even have a clue what bitcoin even is.

That's why it seems like the person was targeted by someone who did know and did know where it was stored and did know what was being used for security. It wasn't a random, wild lucky guess oh hey, this guy has bitcoin, let's take it!

How common is it people get keyloggers - realistically speaking? How do you know if you have one/more? Even the suggestions on the one hand to run all sorts of anti virus/malware scans get opposed by others saying well, you can have them and they're undetectable til it's too late. What the hell are people doing where they end up getting keyloggers?

The exchange the last couple of pages with the one person just digging up every possible FUD gloom scenario is all spooky but how realistic is it the average person will ever encounter all that without some "hacker thief" on the other end expending an ENORMOUS amount of energy, time, and attention to doing all that convoluted shit when he'd make more money just hacking into a regular bank account and swiping it the old fashioned way, or hacking gift cards.

If they're going to this trouble, isn't it more reasonable it'd been a focused specific act of theft?

Can it be positively proven any of these stories of theft are actually theft and not legit transactions - such as the scenario Joe Blow sees "A" transaction of 50btc made and pretends they were "his" all along and tries to get it sent to him instead?

Can any of these tales of theft be proven? Most everything the government and media say about bitcoin is how unsecure it is. If it was THAT risky nobody would be sinking millions of dollars into it. They have way more to lose than some random btc enthusiast with a few bitcoin. Why would any hacker thief in his/her right mind waste a shred of a second going after 90btc when they could go after the people holding hundreds of btc?

Add to that, all these stories (aside from on this forum) all seem to be that hackers hacked the exchange and made off with bitcoin.

Really?

Correct me if I'm mistaken here but exchanges trade fiat currency that is easily spent here and now with digital cryptocurrency that's hardly accepted anywhere. And you mean to tell me a hacker is that much of a screaming dumbass he'd steal virtual currency whose value could be $1 three hours after he steals it instead of fiat he could cash out in a hurry?

These exchanges that popped up - omg we got hacked, *boom* shut down. New one pops up...omg we got hacked too! *boom* shut down. That's the pattern, these new exchanges jump up, claim hackery and bankruptcy and vanish. Sounds to me like someone's full of shit - hackers didn't hack anything, the ones running the exchanges were the real thieves and made off with people's money.

In real life, without being specifically targeted, how common - realistically speaking - is it for bitcoin owners to end up with keyloggers and trojans and malware  specifically programmed to sniff out and steal bitcoin without the user going somewhere specific or downloading something specifically related TO btc in the first place - which would seem rather easy enough to root out.

Sincere questions and observation.
legendary
Activity: 2632
Merit: 1023
May 13, 2014, 10:49:10 PM
I feel like all these stories require further investigation. As much as we all like to talk about backdoors and keyloggers, I have yet to hear ANYONE losing their accounts to keyloggers.

I agree with this.

Post Snowden, It's seems plausible that there are backdoors keylogger in hardware, eg intel and amd. Aso probally widows software.

I mean why wouldn't there be? The Gov just leans on them to do it.

I'm not sure how easy this is to check in the circuitry of an intel chip, though I think some one would have noticed by now....maybe.

Using a linux o/s offline that signs transactions seems the only safe way.

This is one of the driving reasons I wrote my coinwatcher software. I can load a html web page, and see all my addresses with no login, no private keys, no wallet, no sign in or anything and I can conveniently see what is in my addresses. Though I would use behind TOR so block chains that it queries do not get wise to where your IP.

full member
Activity: 164
Merit: 100
Indie Developer
May 13, 2014, 10:21:04 PM
Now I just want to know how the wallet summary can show a double-direction arrow and a n/a address?

I didn't see anyone answer. I'm pretty sure I have understood this properly:

  • The double arrow is shown when a transaction is made that has inputs other than are in the wallet of the QT you are running. It was created by another client that has your privkey and other privkeys that you don't have.
  • The n/a address is shown when there are more than one output that is not a change address in your own wallet. In the transaction you are mentioning, none of the outputs are likely a change address, so QT can't know which one to show.

This means that if your wallet file was stolen, the thief imported other addresses before they sent, or they are creating transactions with different software that they importet you privkey and other privkeys to.

-OR-

This kind of transaction is actually most likely to be caused by the real owner after he/she has been exporting and importing addresses and been playing around with wallet files. In this case the coins weren't stolen but just transferred by mistake to another address you own. Coins might not be lost after all!
newbie
Activity: 18
Merit: 0
January 28, 2014, 12:47:56 PM
The only way they can steal anything from any wallet is if they get a hold of the wallet.dat file. There is simply no other way. So at some point you get hacked, you may not even notice this, then when you have enough coins to steal they will sact. I think it makes sense to change your wallets, create a new ones on regular basis and transfer the coins around and always encrypt your wallets with 128bit+ passwords. You may not know when they put a keylogger on your PC if its not properly protected. I wouldn't be surprised if some Pool sites are infected with keylogger scrypts. They dont steal accounts maybe because its easier to just get into your wallet and steal your coins especially if you have weak passwords.

I bet they try to brute force the password, running their little evil scrypts to try to hack your password every day like you are running miner every day. So if password isn't changed like on weekly basis it is eventually hacked. As more often password changed as more complicated is to hack through your wallet as long as you don't have a keylogger. There are also programs out there that would populate the password field for you without you typing anything, in that case keyloggers won't help the hacker.

When you deal with something as open and raw as Internet you need to take 10x times stronger precautions than what you'd do for something like a house or a safe. Use different PCs every month (virtual machines, image, clone etc), transfer your coins around so they don't sit in the same wallet for weeks etc etc. Its hard to catch a log on the river with a strong current.  Wink If you get rich and catch an eye of the hacker they will be tracinh you, hacking you, following your every online move until they get a hold of your wealth. Then they will vanish and you will never find them.

Sorry to hear that OP, but maybe your unfortunate problem can be a reminder for others to watch out, you are on the Internet!
legendary
Activity: 1806
Merit: 1521
January 28, 2014, 11:10:36 AM
This money is lost - it went through many addresses:
https://blockchain.info/de/tree/109329398


Oh nice!  That's pretty cool.  Didn't realize you could track it like that.

Sorry to the OP for the loss.  That hurts Sad
Pages:
Jump to: