Author

Topic: [ANN][JPC]MAKE JACKPOTCOIN GREAT AGAIN! - page 147. (Read 470275 times)

sr. member
Activity: 476
Merit: 250
Couldn't connect to the stratum at hash@me. Tried miningpoolhub, but their frontend is offline. It looks like pools are still under attack.  Angry

I can connect to hash@me.
All my workers are fine.

Hash@me is under some sort of attack. The pool keep getting 1000% - 3000% shares from time to time.

All large pools are under attack.  Smaller ones are fine and finding blocks easier than before it seems.  Just what the attackers wanted I guess :-/
sr. member
Activity: 282
Merit: 250
that sucks for whoever got scammed. im spreading my JPC to 31 places now.

31 places? Can you remember all those later?
full member
Activity: 210
Merit: 100
Couldn't connect to the stratum at hash@me. Tried miningpoolhub, but their frontend is offline. It looks like pools are still under attack.  Angry

I can connect to hash@me.
All my workers are fine.

Hash@me is under some sort of attack. The pool keep getting 1000% - 3000% shares from time to time where there is 0 -2 block under one hour. I happen to saw 1 block in 2 hours previously and then suddenly 11 blocks pop up.
full member
Activity: 210
Merit: 100
this jackpot prize is making mining so unstable at pool (Chinese attacking top pools). Hopefully it get won within 24 hours.
sr. member
Activity: 282
Merit: 250
Couldn't connect to the stratum at hash@me. Tried miningpoolhub, but their frontend is offline. It looks like pools are still under attack.  Angry

I can connect to hash@me.
All my workers are fine.
sr. member
Activity: 282
Merit: 250

What is the bounty for translating the op in another language?
Also, translating the main site?
member
Activity: 111
Merit: 10
Couldn't connect to the stratum at hash@me. Tried miningpoolhub, but their frontend is offline. It looks like pools are still under attack.  Angry
sr. member
Activity: 343
Merit: 250
full member
Activity: 210
Merit: 100
if i hold 100 million at exchange, i will make sure to spend that 5 mins to on my 2 FA. Maybe that guy don't on 2 FA and his account password was "password". And out of all accounts, the hacker know who to look for and happen to only hack that one account. The timing was also pretty good. Dump before the 53 million jackpot dump.

It's pretty exciting now. Its either we go back to 10 -30 sat or we go to > 100 sat. Place your bet.
hero member
Activity: 868
Merit: 1000
that sucks for whoever got scammed. im spreading my JPC to 31 places now.
full member
Activity: 154
Merit: 100
drama lol  Cheesy

edit:
kinda funny some guy had his account hacked for 100 million coins and yet we didn't here from him but the exchange lol
that was insisting there was proof.. did anyone ask for proof ?

maybe the guy who got hacked do not speak any English? and ask atom to speak on his behalf?
maybe he is too embarrassed? Its anyone guess, but I don't see why atom would be making this up, seems to be too elaborate to be a lie made up just to calm the investors after a dump.
full member
Activity: 126
Merit: 100
kinda funny some guy had his account hacked for 100 million coins and yet we didn't here from him but the exchange lol
that was insisting there was proof.. did anyone ask for proof ?

Not from me but these two guys did...

And on a related note, I'm curious about this - how did you get this email (I assume it wasn't you that was hacked).

concrete proof of that? 100M could have been made in a few days from a big farm when diff was 30 or something...
legendary
Activity: 1540
Merit: 1011
FUD Philanthropist™
drama lol  Cheesy

edit:
kinda funny some guy had his account hacked for 100 million coins and yet we didn't here from him but the exchange lol
that was insisting there was proof.. did anyone ask for proof ?
sr. member
Activity: 476
Merit: 250
why still some selling after bittrex backup?  Huh

They might be like me and sold instead of bought by accident, lol.  Allcrypt is set up with selling on the opposite side from Bittrex and I had just woken up.  Oops.  I should be able to buy back in and support the next rise by the looks of it though.
sr. member
Activity: 282
Merit: 250
Today's 100M JPC sell order on Bittrex was due to hacker's attack

I have a proof of a bittrex email showing the hacker's attack and log data.
Bittrex is still investigating the details, but it seems the login password was broken.
It was only for one account, and no further hacking activity was reported.
It was not related to any JackPotCoin's bug.

The hacker sold about 100M JPC today, and cashed out BTC by trading other junk coins with his another account.
I will announce the details once the investigation is finished.


I expect the JPC price will recover back to above 70 very soon, so hurry up if want to catch some cheap coins now.

Okay, here is the proof.

=========
[Bittrex] Re: Your account appears to be compromised
14-06-11
####
:  R###### (Bittrex)<[email protected]>
####
##- Please type your reply above this line -##
Your request (###) has been updated. To add additional comments, reply to this email.
R######  
Ri###### (Bittrex)
Jun 10 14:44

Sorry, there was a typo... your 2fa was NOT on...

R####  
R#### (Bittrex)
Jun 10 14:29

Sorry to inform you but it looks like someone has hacked your accounts and performed enough fraudulent trades on it to drain the balance. We tried to stop the transactions and subsequent withdrawals but was unable to. I'm providing as much detail as I can in the hopes you can take legal action to recover your funds:

First it looks like your 2fa was on which allowed the attacker to log in:
UserName   PasswordHash   SecurityStamp   Uses2FA   Secret2FA
#############################################

Second, here is the IPs from which someone logged into your account:
123.***.***.**   Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36   2014-06-09 01:31:05.860
123.***.***.**   Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36   2014-06-09 05:11:45.940
123.***.***.**   Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36   2014-06-09 08:29:14.697
123.***.***.**   Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36   2014-06-10 03:24:43.800
123.***.***.**   Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36   2014-06-10 09:27:14.283
67.***.***.***   Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.137 Safari/537.36   2014-06-10 14:23:30.360
95.***.***.***   Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0   2014-06-10 18:44:29.460
77.***.***.***   Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0   2014-06-10 19:10:58.693
95.***.***.***   Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0   2014-06-10 19:36:32.293

The person then proceeded to BUY CAIX at 12btcs per a unit at 2014-06-10 19:13:03.457

The person that received the proceeds is c#######@gmail.com from the follow IPs:

188.***.***.*** Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0   2014-06-10 14:39:26.547
89.***.***.***   Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0   2014-06-10 16:04:17.397
46.***.***.***   Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0   2014-06-10 18:08:46.013
77.***.***.***   Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0   2014-06-10 18:13:58.217
193.***.***.***   Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0   2014-06-10 18:25:28.293
94.***.***.***   Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0   2014-06-10 19:09:42.933
129.***.***.***   Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0   2014-06-10 19:13:45.497
128.***.***.***   Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0   2014-06-10 19:46:19.583

If there is anything else we can provide, please don't hesitate to ask.

Thanks
R####
123.***.***.***

============================================================

And finally you can find how much the hacker took here,
https://www.bittrex.com/Market/?MarketName=BTC-CAIX
You can find the 47 BTCs transaction on the time that this email described.

By the way, this is not my account. This owner of the account sent this message to me to protect other JPC investor's interest.

 
legendary
Activity: 1540
Merit: 1011
FUD Philanthropist™
some guys are so itchy to dump for cheap lol

why throw away profit guys come on..

put in a good order and just wait Smiley

edit:
guys get scared and desperate and sell worried price won't come back up
and they fall over themselves trying to sell first in a panic..

Pro Tip:
Set your order at any price and it will sell.
And if we all stick to that ..that is it.

or we can trample each other in a panic to dump for anything you can get..
and then kick yourself in the ass later when the price goes way higher lol
It's up to you Wink
newbie
Activity: 13
Merit: 0
why still some selling after bittrex backup?  Huh
legendary
Activity: 3248
Merit: 1070
i don't care about btc value, i care only about the value between coin and btc, btc value will always rise at the end i know that

sr. member
Activity: 476
Merit: 250
hopefully they should start pumping this bitch again, poloniex has no volume...

It shouldn't even be a pump to get up to 70's. BTC is down $20 so the price should be higher than yesterday if 55-60 was it's average.
legendary
Activity: 3248
Merit: 1070
hopefully they should start pumping this bitch again, poloniex has no volume...
Jump to: