Author

Topic: BEWARE of Localbitcions.com - My account was hacked and BTC was stolen (Read 1686 times)

sr. member
Activity: 672
Merit: 250
Most Advanced Crypto Exchange on the Blockchain
You are the one who was hacked easy not them.
Don't blame others for your own stupid mistakes.
Learn to loose when u did mi stake and move on.
No one is going to refund you anything consider you are the one fucked yourself with the phishing link...
Gf


FU TOO a$$wipe.
I simply misclicked a link, saw it was phishing, took actions to prevent it, and their site
let it happen.

Funny how people get scammed all the time on this site and the little fanboy wanabe hackers immediately
start helping.

I point out something and get attitude like that.

Like I said.  Go FUCK youself.
legendary
Activity: 910
Merit: 1000
★YoBit.Net★ 350+ Coins Exchange & Dice
They probably used 1 of 1000000 open email servers but you can def see headers in gmail. You click or more or actions or something. Look on google and you'll find it. Kinda no point though as i said but you never no...
full member
Activity: 195
Merit: 100
The Skin GURU/We all love the abused trust system
You are the one who was hacked easy not them.
Don't blame others for your own stupid mistakes.
Learn to loose when u did mi stake and move on.
No one is going to refund you anything consider you are the one fucked yourself with the phishing link...
Gf
sr. member
Activity: 672
Merit: 250
Most Advanced Crypto Exchange on the Blockchain
BE WARNED!!!

If you account is hacked at Localbitcoins.com, YOU WILL NOT be reimbursed.
They thing their system IS FINE from the last message I received and they will not reimburse
anyone even if your walltet gets emptied

BEWARE!!!!









Hi,

we are really sorry that you had bad experience with localbitcoins.

I don't know if this changes anything regarding who to blame etc., but I'll try to guess what happened here.

First of all, the attacker somehow got your new password with this login:

XXXXXXX (0)    June 30, 2014, 1 p.m.    Logged in    207.244.76.170    Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36

If you are telling the truth when you say that you changed your password to be 32 character random password, the only option is that the attacker somewhat got an access to your computer, either with some kind of remote access or keylogger. Since the timing with the login was way too perfect (attacker logging in 18 seconds after 2FA was disabled, and 20 seconds before you enabled 2FA again) there are practically no other option than some really heavy access to the computer you were using. However, the attacker still required the 2FA key. When you disabled the 2FA, the attacker got in. The weird thing is that the attacker did not even have your password before you had changed it.

When the attacker was inside, you enabled the 2FA. The key to activate 2FA is visible for the user for the next 24 hours. Therefore when the attacker realized that 2FA was enabled when he tried to withdraw funds, he finally found the 2FA activation key from your profile settings, since he/she was logged in to your account earlier. Then the attacker just simply used the 2FA activation key to provide key for log in, and withdrew the funds.

Right now we are changing the system so that when you do change password or enable 2FA, all other sessions are dropped, and it would have had dropped the attacker at the time you enabled 2FA, or the attacker would have enabled it himself, and you would have dropped out.

Also, we have introduced new login guard feature, which means that the account is only accessible by browsers which are verified by email.

It is true that we could have had provided these features earlier, and that with better luck nothing like this would have even happened. However, all our security features were working as designed at the time this hack happened, and therefore we cannot consider reimbursing your losses.

---
Best regards,
Nikolaus





GO FUCK YOURSELF Nikolaus and everyone at Localbitcoins.com


I wouldnt trust these fucking people if I were you.

They are so fucking full of themselves they wont even reimburse me a simple 0.5BTC when they literally admitted
their system has a hole the size of a barn door to let hackers in if you simply click on a link.  JESUS H!!!!
sr. member
Activity: 672
Merit: 250
Most Advanced Crypto Exchange on the Blockchain
Yesterday I got what I thought was an email from localbitcoins.com administrators.  It in fact turned out to be a phishing
scam which I didn't realize until after I clicked on the phishing link.  The following is the email I received.
I know its not much but I say its open season to go after these guys and steal anything back from them that they have.
If you steal like that from someone I say you deserve to have 100X stolen back from you.

Just split anything you get with me.  LOL.  Yah I can dream right.


FROM: [email protected] [email protected] via comcast.net

***
I cant see the full email header to get an IP but I wish I could. It looks like they somehow spoofed the email address.
If anyone knows how to get the full email header from GMAIL let me know and Ill add that information.
***

Hi,

This message is to alert you that your account has been temporarily flagged as potentially fraudulent due to information provided in a support ticket opened by another user.
Please confirm that you are the owner of this account by responding at your convenience before we proceed. Thank you. https://localbitcoins.com/support/reply/787334/

*****
This link ACTUALLY takes you here:

http://ammaraandlayla.com/v/login.htm

That website translates to here at an NSLOOKUP:
23.229.162.73


General IP Information
IP:   23.229.162.73
Decimal:   400925257
Hostname:   ip-23-229-162-73.ip.secureserver.net
ISP:   GoDaddy.com, LLC
Organization:   GoDaddy.com, LLC
Services:   None detected
Type:   Corporate
Assignment:   Static IP
Blacklist:   
Geolocation Information
Country:   United States us flag
State/Region:   Arizona
City:   Scottsdale
Latitude:   33.6119  (33° 36′ 42.84″ N)
Longitude:   -111.8906  (111° 53′ 26.16″ W)
Area Code:   480
Postal Code:   85260

*****

Best regards,
Edgar
LocalBitcoins.com (automated message)


Immediately after I realized what happened I changed my password and even went as far as resetting the google authenticator 2 form factor authentication so it would be on a new authentication string for extra caution.

I then immediately submitted a ticket to Localbitcions.com alerting them about what I received and to inform them
that their could be potential hackers attacking their website.








I figured that all was well and I would be safe.  Id reset my password AND reset the two form factor authentication so they would need my phone to do anything with my account right.  I WAS WRONG!!!


About 2 hours later, I noticed my wallet balance at Localbitcoins was ZERO.  Now, I only lost 0.5BTC but this was just a kick in my chest to think that even with the two form factor authentication AND a new password that was 32 characters long and has everything from uppercase, lowercase, numbers, special characters, EVERYTHING, it was still hacked in less than 2 hours.

NOW I was just fuming.  I opened another ticket with Localbitcoins.com to tell them
what just happend after I told them their site may be compromised.

Here is the transaction if anyone can do anything with it.


06/30/2014 20:54         0.5    Sent to 1D8niJyfQrfiUpgXe36s8M9QFiw2xgCXD4

txid e377545df538d973f23dc93f9392cc2a4109779029ab04176f97fb49d4251ee5



The replies I got back made me even more upset and untill now, the staff at Localbitcoins.com has not compensated
me for an anauthorized access of my account from ANOTHER COUNTRY.  I live in Japan and proved the IP address my PC was using.
Then what shocked me was their staff sent me all the transaction logs and the IP addresses from the attackers so to me its opens season on these guys.  Ill be posting in the bitcointalk forums to get the guys who have fun with that stuff to track these guys down if they can.

So, the part that has upset me the most is the COMPLETE lack of security at their website.

I had two form
 factor security set up and they still managed to log into my account and send off the funds from my wallet.

When they replied to me they said they would not help me and would not compensate me to return the stolen funds.
This is beyond unacceptable to me.

1st, their site security is obviously VERY VERY lax.  I reset my password and it was hacked at the site in minutes.
2nd, their security is obviously not very good when they can bypass the two form factor authentication.  I mean my phone is in Japan and the attackers were in the USA.  Obviously the hackers were able to access the website to pull
information they needed to bypass the 2 form factor authentication or to reproduce mine.
3rd, they have no security to protect you account when people log in from a completely different country
 and they dont
stop them.  They dont have ANY kind of protection that locks your account when such a login after unsuccessful logins occur from ANOTHER country.  Such a thing should lock your account and require you to authenticate your identity from
an email from the site and a call or text to your registered telephone number.

The whole thing stinks to me and I wonder how many other people have been hacked.

Im including the unauthorized access to my account as well just as an FYI for you if you can do anything with it.


Also on a final note, I just noticed that after my complaints to the site yesterday, they now require a human verification
captcha login requirement AFTER they got hacked and my BTC was stolen.  I think its all too little too late and they are a prime target for hackers and are doing nothing to protect its customers, and will do nothing after their customers are robbed:



Here are replies I got form the site:
Ive added notes to what IP was me and what was the one who hacked the site.






Please tell us what IP is the one from the attacker since there is many different and we only can recognize the one who withdraw your funds:
Really admin idiots?  You cant tell WHO withdrew the funds?
Obviously the one that says SEND FROM WALLET and the one who was NOT me changing my password
like I told you I would do to prove what PC and IP I was using at home.  FKNG idiots!!!


   XXXXXXX (0)   June 30, 2014, 2:54 p.m.   Send from wallet   46.21.154.83   Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36

THIS WAS THE HACKER

 XXXXXXX  (0)   June 30, 2014, 2:45 p.m.   Two-factor Phase 2 login   46.21.154.83   Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36

THIS WAS THE HACKER

 XXXXXXX  (0)   June 30, 2014, 2:37 p.m.   Two-factor Phase 1 login   46.21.154.83   Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36

THIS WAS THE HACKER

 XXXXXXX  (0)   June 30, 2014, 2:22 p.m.   Two-factor Phase 1 login
   46.21.154.83   Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko)
 Chrome/35.0.1916.153 Safari/537.36

THIS WAS THE HACKER

 XXXXXXX  (0)   June 30, 2014, 1:05 p.m.   Two-factor Phase 1 login   207.244.76.170   Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36

THIS WAS THE HACKER

 XXXXXXX  (0)   June 30, 2014, 1:03 p.m.   Two-factor Phase 1 login   207.244.76.170   Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36

THIS WAS THE HACKER


 XXXXXXX  (0)   June 30, 2014, 1:03 p.m.   SMS sent       Content: Localbitcoins.com verification token: XXX

THIS WAS ME AT HOME VERIFYING MY TELEPHONE NUMBER.


 XXXXXXX  (0)   June 30, 2014, 1:03 p.m.   Two-factor Phase 2 login   118.15.15.241   Mozilla/5.0 (Windows NT 6.1; WOW64; rv:30.0) Gecko/20100101 Firefox/30.0

THIS WAS ME AT HOME

 XXXXXXX  (0)   June 30, 2014, 1:03 p.m.
   Two-factor Phase 1 login   118.15.15.241   Mozilla/5.0 (Windows NT 6.1; WOW64; rv:30.0) Gecko/20100101 Firefox/30.0

THIS WAS ME AT HOME

 XXXXXXX  (0)   June 30, 2014, 1:01 p.m.   Two-factor enabled      118.15.15.241   mobile

THIS WAS ME AT HOME RESETTING MY 2 form factor authentication to
setup the Google authenticator on a new authentication string.

 XXXXXXX  (0)   June 30, 2014, 1 p.m.   Logged in   207.244.76.170   Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36

THIS WAS THE HACKER

 XXXXXXX  (0)   June 30, 2014, 1 p.m.   Two-factor disabled    118.15.15.241   

THIS WAS ME AT  HOME RESETTING MY 2 form factor authentication to
setup the Google authenticator on a new authentication string.

   XXXXXXX  (0)   June 30, 2014, 1 p.m.   Password change request   118.15.15.241   
 
THIS WAS ME AT HOME RESETTING MY PASSWORD AFTER RECEIVING
THE EMAIL I REPORTED

 XXXXXXX  (0)   June 30, 2014, 12:59 p.m.   Password change request   118.15.15.241   
 
THIS WAS ME AT HOME RESETTING MY PASSWORD AFTER RECEIVING
THE EMAIL I REPORTED

 XXXXXXX  (0)   June 30, 2014, 12:57 p.m.   Failed login attempt   207.244.76.170   Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36

THIS WAS THE HACKER   

   XXXXXXX  (0)   June 30, 2014, 12:55 p.m.   Failed login attempt   207.244.76.170   Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36


THIS WAS THE HACKER



--- Best regards, Edgar








General IP Information
IP:   46.21.154.83
Decimal:   773167699
Hostname:   83.154.21.46.in-addr.arpa
ISP:   Swiftway Sp. z o.o.
Organization:   Dedicated-servers
Services:   None detected
Type:   Corporate
Assignment:   Dynamic IP
Blacklist:   
Geolocation Information
Country:   United States us flag
Latitude:   38  (38° 0′ 0.00″ N)
Longitude:   -97  (97° 0′ 0.00″ W)


ALSO in the USA!!!
HOW CAN THEY HAVE MY PHONE???
They didnt seem to care or believe me.

General IP Information
IP:   207.244.76.170
Decimal:   3488894122
Hostname:   hosted-by.leaseweb.com
ISP:   Leaseweb USA
Organization:   Leaseweb USA
Services:   None detected
Type:   Corporate
Assignment:   Static IP
Blacklist:   
Geolocation Information
Country:   United States us flag
State/Region:   California
Latitude:   34.0522  (34° 3′ 7.92″ N)
Longitude:   -118.2437  (118° 14′ 37.32″ W)







Their final response to me was the following that they would not be helping me and would not
refund my STOLEN BTC.


By Support.Localbitcoins
June 30, 2014, 10:14 p.m. - 12 hours ago

Hi,,

We can not reimburse your loss , since we are not responsible for where you click or the security breach you have in your device.
If the attacker got your authentication code by the phishing email I would suggest you to create a new account.

---
Best regards,
Edgar


In response to:

IT is impossible they got the NEW 2FA code because I JUST CHANGED it mins after I got the email.

AFTER I got the email, and yes I did click on the link I got, I saw that the address was not localbitcoins.com
and immediatley sent you the first case where I reported getting the email.

THEN, I changed my password seconds after I clicked on the link and realized it was a phishing site, AND I reset the 2 form factor authentication so it was on a new authentication string.  How could they have that?

EVEN doing that, they still hacked your website and my account.

HOW IS THAT POSSIBLE.
THIS IS UNACCEPTABLE.

Here is what I want.
I want my 0.5BTC returned to me at this address:

1JxiQk4V1jgDSbWNMi2rgQL76hNbX1vFQC

I dont want to use this website again when it can be hacked so easily.

I TOLD YOU that I got something fishy, expected something, went as far as changing my password
AFTER I clicked on that link, and resetting my 2 form authentication, and they STILL hacked
your website.  THAT IS UNACCEPTABLE.

If my 0.5BTC is not returned to me I will be reporting your website to the authorities in my
home city as FRADULENT.

This is unacceptable to me!!!

By Support.Localbitcoins
June 30, 2014, 10:14 p.m. - 12 hours ago

Hi,,

We can not reimburse your loss , since we are not responsible for where you click or the security breach you have in your device.
If the attacker got your authentication code by the phishing email I would suggest you to create a new account.

---
Best regards,
Edgar
Jump to: