Author

Topic: Bitcoin Client Exploit (Read 3979 times)

hero member
Activity: 532
Merit: 500
FIAT LIBERTAS RVAT CAELVM
July 31, 2011, 02:00:12 PM
#17

The point is that because Bitcoin is P2P based, you could identify ppl with bitcoins pretty easily + if you got a client exploit, GOTCHA, 100% vulnerability...

I hereby dub you "Derpcules"

+1
member
Activity: 98
Merit: 10
July 31, 2011, 01:50:57 PM
#16

The point is that because Bitcoin is P2P based, you could identify ppl with bitcoins pretty easily + if you got a client exploit, GOTCHA, 100% vulnerability...

I hereby dub you "Derpcules"
newbie
Activity: 4
Merit: 0
June 17, 2011, 03:28:37 PM
#15

The point is that because Bitcoin is P2P based, you could identify ppl with bitcoins pretty easily + if you got a client exploit, GOTCHA, 100% vulnerability...
hero member
Activity: 532
Merit: 500
FIAT LIBERTAS RVAT CAELVM
June 17, 2011, 03:21:44 PM
#14
You want some tinfoil hat stuff...
Gavin talks to government about Bitcoin => Mining pools and Mt Gox get DDoSed.

Coincidence?

I think not!
hero member
Activity: 767
Merit: 500
June 17, 2011, 03:14:32 PM
#13
Catalyst 11.6 comes out... Wallets get stolen... AMD stock goes up... Are they linked?! Tinfoil hats!
newbie
Activity: 25
Merit: 0
June 17, 2011, 03:08:40 PM
#12
Never mind a Bitcoin Client Exploit...

ANYTHING downloaded after the sharp rise in Bitcoin prices is a potential trojan wallet stealer.

You really like that fancy free screensaver/app/util/crack/game/whatever.  You download and install.  2 minutes later, wallet & Bitcoins gone.

I expect the amount to Bitcoin hack/trojan heists to sharply increase in the next few months.

You have been warned.  Take appropriate evasive maneuvers meow. Wink
member
Activity: 84
Merit: 10
I need an new box...
June 17, 2011, 02:55:39 PM
#11
On the matter, wouldn't it be fairly easy to sneak malware onto any of the various parts of mining. The miner, the kernel, these are all exes that could be potentially tampered with.

Definately very easy, so only download from trusted sites / users. Which are those? I don't know, just got here  Smiley

If in doubt go to the 'mining software' sub-board of the 'mining' topic. In one of the stickies you will find a list of clients and their links for download. Download from those rather than from some random Google search. Lots of good info in there too on client recent changes, upcoming changes, and how to run/use. Good Luck.
hero member
Activity: 532
Merit: 500
FIAT LIBERTAS RVAT CAELVM
June 17, 2011, 02:49:23 PM
#10
Best practices:
Do not mine on the same computer you run the client on.
Do not run the client on a potentially compromised system. (IMO this includes ALL windows systems)
Back up your wallet.dat securely. There are other threads about that.
ONLY use the client from Bitcoin.org. It's free, there's no reason to get it anywhere else.


I'm sure there are more, But this will be a good start.
newbie
Activity: 28
Merit: 0
June 17, 2011, 02:42:50 PM
#9
On the matter, wouldn't it be fairly easy to sneak malware onto any of the various parts of mining. The miner, the kernel, these are all exes that could be potentially tampered with.

Definately very easy, so only download from trusted sites / users. Which are those? I don't know, just got here  Smiley
newbie
Activity: 5
Merit: 0
June 17, 2011, 02:40:29 PM
#8
On the matter, wouldn't it be fairly easy to sneak malware onto any of the various parts of mining. The miner, the kernel, these are all exes that could be potentially tampered with.
hero member
Activity: 532
Merit: 500
FIAT LIBERTAS RVAT CAELVM
June 17, 2011, 02:23:45 PM
#7
No need. Most of these clients are running on windows, which has security holes big enough to drive an M1 Abrams through.

Tanks can go thru lots of things easily regardless of the original size of the opening, perhaps a blimp would be a better vehicle to illustrate your point.

Fine point, fine point...

Very well, Consider my statement to be amended thus: ...big enough to float the Goodyear blimp through.
hero member
Activity: 616
Merit: 500
Firstbits.com/1fg4i :)
June 17, 2011, 02:04:40 PM
#6
No need. Most of these clients are running on windows, which has security holes big enough to drive an M1 Abrams through.

Tanks can go thru lots of things easily regardless of the original size of the opening, perhaps a blimp would be a better vehicle to illustrate your point.
sr. member
Activity: 294
Merit: 252
June 17, 2011, 01:58:21 PM
#5
What's been going on lately is, a modified poclbm was circulated that contains a trojan.  Apparently people fell for its claims of cpu efficiency or whatever.

Was there a thread on this?
full member
Activity: 168
Merit: 100
June 17, 2011, 01:54:56 PM
#4
There's quite a few problems with this.
Unless a person is running a client configured to act like a server and somehow removes a username/password requirement along with allowing any IP, then sure, someone could just tell the client to send out the coins in their wallet.

Secondly, assuming that the client is configured properly and that it's a buffer overflow (or something similar) via network communication... well... the source code for the bitcoin client is publicly available and there haven't been any exploits so far.  That's not to say that there's no chance that there's a potential exploit, but for the most part, bitcoin has well defined protocol standards and uses JSON formatting to send data.

Lastly, if you're talking a local malicious action (where a user has access to a computer directly), then there's nothing bitcoin could do to stop it because that's a system wide unauthorized access.  Anything a user could do an attacker would do.


So long story short, I wouldn't sweat it.  Bitcoin uses well defined standards so unless there happens to be a massive gaping hole in open source software that nobody's managed to spot (and the exploitation of it thus far has impossibly managed to stay invisible), then there really isn't a need to worry.
newbie
Activity: 14
Merit: 0
June 17, 2011, 12:47:04 PM
#3
That's probably not the situation.

Someone could be distributing a trojaned modified client, though.

What's been going on lately is, a modified poclbm was circulated that contains a trojan.  Apparently people fell for its claims of cpu efficiency or whatever.
hero member
Activity: 532
Merit: 500
FIAT LIBERTAS RVAT CAELVM
June 17, 2011, 12:46:32 PM
#2
No need. Most of these clients are running on windows, which has security holes big enough to drive an M1 Abrams through.
newbie
Activity: 4
Merit: 0
June 17, 2011, 12:45:05 PM
#1

Would be an explanation for all the stolen BCs...

All these clients are nicely p2p networked, IPs available for everyone, traceable...if someone exploits the client => mass robbing!
Jump to: