Author

Topic: Bitstamp bruteforce attack on 2FA (Read 923 times)

legendary
Activity: 2492
Merit: 1473
LEALANA Bitcoin Grim Reaper
June 01, 2014, 02:55:21 AM
#13
easy fix for users for this problem:

1. Don't keep any funds or BTC on bitstamp

2. Change your password when you plan to send funds to your account. (before you send)

3. When you do send funds to bitstamp either buy or sell and withdrawal immediately.



legendary
Activity: 1286
Merit: 1004
June 01, 2014, 02:52:12 AM
#12
They are in no hurry to correct obvious bugs
it is very bad for their reputation
legendary
Activity: 1286
Merit: 1004
June 01, 2014, 02:50:39 AM
#11
They should freeze account login after 3-5 failed attempts.


or freeze 2FA on 1 hour after 3 failed attempts
legendary
Activity: 1286
Merit: 1004
June 01, 2014, 02:49:48 AM
#10
The code changes every 30 seconds, so you can try the same 50 codes every 30 seconds and hope to get lucky over time.
you just need generate random codes
30 sec has no effect its just probability theory
legendary
Activity: 1286
Merit: 1004
June 01, 2014, 02:47:46 AM
#9
this is horrible if there's no limit from bitstamp for failed attemps
someone could get lucky after several tries, and get BTC from user balance
freeze account login after several failed attemps is must implement in bitstamp
i send 100 request per minute
to break bitstamp login 2fa you need only 7 days
what is 7 days? the google code change every 30 seconds
no fixed time to break it, just pure luck

yes 7 days its mean

100 random codes in minute its 1000000/100 minutes = 7 days
7 days - average value
legendary
Activity: 1512
Merit: 1011
May 31, 2014, 11:06:30 PM
#8
this is horrible if there's no limit from bitstamp for failed attemps
someone could get lucky after several tries, and get BTC from user balance
freeze account login after several failed attemps is must implement in bitstamp
i send 100 request per minute
to break bitstamp login 2fa you need only 7 days
what is 7 days? the google code change every 30 seconds
no fixed time to break it, just pure luck
full member
Activity: 546
Merit: 100
May 31, 2014, 10:22:17 PM
#7
That's problematic, they need to set up more parameters to prevent access. Agree, lock out should be implemented.
legendary
Activity: 1067
Merit: 1000
May 31, 2014, 10:17:47 PM
#6
They should freeze account login after 3-5 failed attempts.
legendary
Activity: 2618
Merit: 1007
May 31, 2014, 04:09:48 AM
#5
The code changes every 30 seconds, so you can try the same 50 codes every 30 seconds and hope to get lucky over time.
legendary
Activity: 1286
Merit: 1004
May 30, 2014, 08:45:57 PM
#4
i send 100 request per minute
to break bitstamp login 2fa you need only 7 days
legendary
Activity: 1286
Merit: 1004
May 07, 2014, 06:05:24 PM
#3
Bitstamp doesnt have protection against bruteforce attack on 2FA
Have you contacted them prior to posting this here?
its not fatal
yes today contacted
hero member
Activity: 896
Merit: 527
₿₿₿₿₿₿₿
May 07, 2014, 06:03:23 PM
#2
Bitstamp doesnt have protection against bruteforce attack on 2FA
Have you contacted them prior to posting this here?
legendary
Activity: 1286
Merit: 1004
May 07, 2014, 05:59:19 PM
#1
Bitstamp doesnt have protection against bruteforce attack on 2FA
Jump to: