Pages:
Author

Topic: ANN: [OPAL] | POS | Secure Messaging |NO ICO | bitsquare.io | cryptopia | Yobit - page 97. (Read 383418 times)

hero member
Activity: 784
Merit: 500
FLY DONATION ADDRESS IN SIGNATURE
OPAL PRESS RELEASE BLOCK CHAIN ROLLBACK


   Since its inception, OPAL has made significant strides to becoming a valuable asset to the cryptocoin community. An ambitious development team backed by a strong community has proven to be and will continue to be a cornerstone in the continued success of OPAL. With that being said, the OPAL team has found that a user made a malicious post within the OPAL ANN thread which included links to a manipulated version of the wallet. This wallet installs a backdoor which steals wallet.dat files from not only the OPAL wallet, but other cryptocoin wallets as well. Additionally, the user posted links to wallet downloads in other Bitcointalk threads. These downloads are also assumed to be malevolent. The hacker has stolen approximately 17% of the total OPAL coin supply, which is enough to attack the block chain. In light of this, a critical decision has been made by the community to roll back the blockchain, thereby eliminating the possibility of such an attack and to prevent further damage. The OPAL team thanks the community for acting promptly and supporting the continuing growth of OPAL.

   Please remember to only download wallets from the website www.opal-coin.com or download and complie the source yourself, which is available at https://github.com/OpalCoin/OpalCoin.

If there are any questions or concerns, please contact the OPAL team at [email protected] or on the IRC channel freenode #opalcoin.

The OPAL Team


OK. Decision made. Timescales??
Okay I've downloaded the wallet from the website and it still says zero connections plus all my OPAL right now are on Bittrex but bittrex has OPAL disabled? Does this mean I'm gonna lose my coins? Or will I  still have them?
sr. member
Activity: 364
Merit: 250
This wasn't an attack.  It was users installing a backdoor on their computer allowing their wallet files to be taken.  
I use the term "attacker" rather than "hacker". In my mind, the actions of an attacker is an attack.

And if the motive behind the attack was to harm OPAL, it was magnificently successful.

The motive was to steal your coins and convert them to btc and then fiat.  There have been numerous attempts recently to hijack users computers with infected wallets.  Those were typically done with a new coin launch but it appears that they have switched tactics since people have become wise to the Windows wallet only ninja launches that idiots would jump on and run the infected wallet.

Opal was likely just chosen at random.  This should be a warning to all that you never run a wallet posted by anyone but the official representatives for that coin.

This is likely to be repeated with other coins because there is never a shortage of idiots out there and these scumbags know that.  Make sure that you don't just update wallets because it's posted in a thread.  Make sure that the person posting it is legitimate.  

True, however the most important thing is: Don't keep your wallet encryption passwords anywhere near your PC. Even if a hacker was able to steal your wallet.dat file, he cannot grab the coins if he doesnt have the password. Ive heard about a program called keyscrambler, what it does is basically hide everything that you type. Keyloggers won't work for the hacker. Which is pretty important, incase you want to unlock your wallet for staking for example.
sr. member
Activity: 252
Merit: 250
Keeping People Honest - Don't Get Scammed
This wasn't an attack.  It was users installing a backdoor on their computer allowing their wallet files to be taken.  
I use the term "attacker" rather than "hacker". In my mind, the actions of an attacker is an attack.

And if the motive behind the attack was to harm OPAL, it was magnificently successful.

The motive was to steal your coins and convert them to btc and then fiat.  There have been numerous attempts recently to hijack users computers with infected wallets.  Those were typically done with a new coin launch but it appears that they have switched tactics since people have become wise to the Windows wallet only ninja launches that idiots would jump on and run the infected wallet.

Opal was likely just chosen at random.  This should be a warning to all that you never run a wallet posted by anyone but the official representatives for that coin.

This is likely to be repeated with other coins because there is never a shortage of idiots out there and these scumbags know that.  Make sure that you don't just update wallets because it's posted in a thread.  Make sure that the person posting it is legitimate.  
legendary
Activity: 1169
Merit: 1000
why cryptsy not freezed?
newbie
Activity: 40
Merit: 0
Alright, so what's the next move? Are we waiting on an OPAL client update for the rollback?
sr. member
Activity: 364
Merit: 250
This wasn't an attack.  It was users installing a backdoor on their computer allowing their wallet files to be taken.  
I use the term "attacker" rather than "hacker". In my mind, the actions of an attacker is an attack.

There was no attack on Opal. Scam_exposer is right, just user funds that have been taken. Sad enough though.
newbie
Activity: 40
Merit: 0
This wasn't an attack.  It was users installing a backdoor on their computer allowing their wallet files to be taken.  
I use the term "attacker" rather than "hacker". In my mind, the actions of an attacker is an attack.

And if the motive behind the attack was to harm OPAL, it was magnificently successful.
sr. member
Activity: 279
Merit: 250
OPAL PRESS RELEASE BLOCK CHAIN ROLLBACK


   Since its inception, OPAL has made significant strides to becoming a valuable asset to the cryptocoin community. An ambitious development team backed by a strong community has proven to be and will continue to be a cornerstone in the continued success of OPAL. With that being said, the OPAL team has found that a user made a malicious post within the OPAL ANN thread which included links to a manipulated version of the wallet. This wallet installs a backdoor which steals wallet.dat files from not only the OPAL wallet, but other cryptocoin wallets as well. Additionally, the user posted links to wallet downloads in other Bitcointalk threads. These downloads are also assumed to be malevolent. The hacker has stolen approximately 17% of the total OPAL coin supply, which is enough to attack the block chain. In light of this, a critical decision has been made by the community to roll back the blockchain, thereby eliminating the possibility of such an attack and to prevent further damage. The OPAL team thanks the community for acting promptly and supporting the continuing growth of OPAL.

   Please remember to only download wallets from the website www.opal-coin.com or download and complie the source yourself, which is available at https://github.com/OpalCoin/OpalCoin.

If there are any questions or concerns, please contact the OPAL team at [email protected] or on the IRC channel freenode #opalcoin.

The OPAL Team


OK. Decision made. Timescales??
sr. member
Activity: 252
Merit: 250
Keeping People Honest - Don't Get Scammed
OPAL trading was halted several days ago on Poloniex; was that related to this attack?

This wasn't an attack.  It was users installing a backdoor on their computer allowing their wallet files to be taken.  

This has nothing to do with Opal the coin but restoring coins to users that did not protect their computers.  Rolling back the blockchain for user incompetence is idiotic.  



  

I fully support the rollback. If anyone can make this work, is the Opal dev's and community.

People, please scan your computers fully before the rollback takes place.

We have to design a procedure where someone's wallet.dat was stolen and it was not protected with a passphrase.  If we roll back, doesn't the hacker still have the privkeys to the addresses stored in the wallet.dat?

Let's do this patiently and methodically.

Yes
sr. member
Activity: 308
Merit: 250

Malwares bytes already delete startup key / method, and malware files (otherwise h

"This Backdoor or another affiliated agent may reload itself after a remove"

If you remove the malware it can't reload. If a malware reload is because you do not kill the persistence (here the persistence was "csrss.exe", in the same folder as "windhcp.exe", and detected by malwares byte also)

This malware is not really smart Wink don't worry.

(combofix is helpful when some of your system files are corrupted, by malwares)

Ok, thanks StonerStanley, So during the corruption, the backdoor/the attacker can't install other malware/exploit ?


if yes my only advice (for corrupted wallets) will be "CHANGE ALL YOUR PASSWORDS".
sr. member
Activity: 364
Merit: 250
OPAL trading was halted several days ago on Poloniex; was that related to this attack?

Probably not, I believe I read it was some normal maintence
hero member
Activity: 782
Merit: 500
hero member
Activity: 784
Merit: 500
FLY DONATION ADDRESS IN SIGNATURE
Does this mean I'll lose the OPALCoins that I have on the Bittrex exchange? That's the only place I have some right now and wanted to know if I would still have them
?
newbie
Activity: 40
Merit: 0
OPAL trading was halted several days ago on Poloniex; was that related to this attack?
sr. member
Activity: 535
Merit: 267
sr. member
Activity: 294
Merit: 250
★777Coin.com★ Fun BTC Casino!
any chance bittrex can resume trading in the meantime and maybe just keep deposits and withdrawals frozen? how long can we expect to resume trading? i have btc stuck in orders on bittrex i could use to generate profits elsewhere in the meantime.

well iam alsowating for the same but no updates on trading.
full member
Activity: 214
Merit: 100

I fully support the rollback. If anyone can make this work, is the Opal dev's and community.

People, please scan your computers fully before the rollback takes place.

We have to design a procedure where someone's wallet.dat was stolen and it was not protected with a passphrase.  If we roll back, doesn't the hacker still have the privkeys to the addresses stored in the wallet.dat?

Let's do this patiently and methodically.
hero member
Activity: 658
Merit: 500
any chance bittrex can resume trading in the meantime and maybe just keep deposits and withdrawals frozen? how long can we expect to resume trading? i have btc stuck in orders on bittrex i could use to generate profits elsewhere in the meantime.
sr. member
Activity: 308
Merit: 250
"malwares bytes detects the malware as "Backdoor.Agent.SBFGen"


This Backdoor or another affiliated agent may reload itself after a remove

Steps to clean your desktop:

Download Malwarebytes. (go to www.malwarebytes.org check your url field has exactly this url)
while installing, uncheck the "i want to use for free Malwarebytes premium for x days...)
Double click and update it.

Reboot with safe mode choose the simple Safe mode (Without NETWORKING)
if you used USB drive while being infected, plug the USB and start a complete scan
Fix all entries (PUP/Malware/Trojan/backdoor...) except maybe your miner software cgminer/sgminer

for those who were infected AND after the remove/reboot from Malwarebytes (under the safe mode):
check if Malwarebytes re-detect it or not (Re-scan)

if yes, you could try combofix, reboot (normal mode) Download it from bleepingcomputer
Save it to your desktop.

Note: Windows 8.1 and Windows 2000 are NOT supported by ComboFix
(i.E: XP, Vista, Seven and windows 8 is supported)

If you store files here:
-Temporary Internet Files
-Temp Folder
-Windows Recycle Bin
and want to keep it, move them to a safer location before the combofix scan. (remember to replace them after the scan)

You MUST close all open Windows.
Turn off Antivirii, antimalware residents, windows update, java update... other runnning programs.
(remember to turn them on after the scan)

Run Combofix, Please note: Be Patient, dont touch your computer untill been asked by combofix, possibly for:
-the installation of the windows recovery console (click yes)
-the scan (Click 'Yes' to continue scanning for malware...)

Combofix will disconnect your computer from the Internet and it will change your clock format (after the scan it will restore them.)
You will see around 35 to 50 stages, be patient.

The Find3M windows will stay a long time, Again, Be patient.

Then a new screen appear telling you the combofix report, will be located at C:\ComboFix.txt
usefull if you want to have further analyse, you can post this log in the dedicated forum of bleepingcomputer, majorgeeks, Malwareremoval.com

When you are sure your PC is clean, you can uninstall Combofix:
For Vista/seven/8: In the Search field, type Combofix /uninstall
(type a space between "Combofix" and "/uninstall") then press enter.

For XP: click start then Run, in the Run field, type Combofix /uninstall
(type a space between "Combofix" and "/uninstall") then press enter.

Reboot (safe mode) and run a Malwarebytes full scan. You should have wipe the backdoor and any other dangerous hack.
At this point YOU MUST CHANGE ALL YOUR PASSWORDS.

hope it helps Wink
sr. member
Activity: 364
Merit: 250
Im still behind Opalcoin aswell. I understand this is a very hard choice for the opal team. Best of luck!
Pages:
Jump to: