Author

Topic: Community Thread - How BitcoinTalk Accounts Are Hacked? (Read 243 times)

copper member
Activity: 630
Merit: 420
We are Bitcoin!
If you have not posted that addy elsewhere, it probably won't be accepted.


We don't actually accept the profile field address unless there's some sort of proof that it's remained unchanged, for that very reason.

I'm working on a new address-staking system which will automatically handle signatures, etc. Might have it ready by the end of the month if nothing else comes up to consume my time.

Fantastic, thank you.
legendary
Activity: 2968
Merit: 3406
Crypto Swap Exchange
Give me a few minutes and I will find the PM someone received from theymos where he says that he is developing a system to automatically prove you own an account with your staked address.
IIRC, the PM was from ~1 month ago and theymos said that he would try to code it in a few weeks. So it should be out soon. So it will definitely be available in the current forum software (SMF), and not only when the new software comes out.
You realize a number of eye balls are looking at you now?(!)  Smiley
Just to help and post the reference "TryNinja" was looking for (in case he/she had difficulty in finding it):

If you have not posted that addy elsewhere, it probably won't be accepted.


We don't actually accept the profile field address unless there's some sort of proof that it's remained unchanged, for that very reason.

I'm working on a new address-staking system which will automatically handle signatures, etc. Might have it ready by the end of the month if nothing else comes up to consume my time.
legendary
Activity: 2240
Merit: 3150
₿uy / $ell ..oeleo ;(
copper member
Activity: 630
Merit: 420
We are Bitcoin!
IIRC, the PM was from ~1 month ago and theymos said that he would try to code it in a few weeks. So it should be out soon. So it will definitely be available in the current forum software (SMF), and not only when the new software comes out.
You realize a number of eye balls are looking at you now?(!)  Smiley

I can not wait to see the outcome. More or less all of us actually worried about the account security and the time it takes to recover.
hero member
Activity: 504
Merit: 732
maybe there are several factors or some stuff that made these people be vulnerable

Users are not just nicknames in the computer world. They "consist" at least of:
 - themselves (the real persons who sleep, eat etc);
 - their devices (PCs, phones, laptops, tablets, smart TVs smart toasters etc);
 - ways to connect their devices to bitcointalk.org server or any-other-Internet-server (routers, WiFis, DNS etc);
 - public Internet-services related to themselves and bitcointalk.org or any-other-Internet-service.

And almost any of these can be vulnerable.

Themselves. Root of evil in most cases. Here we've got:
 - weak passwords (only lazybones didn't mention the weak passwords);
 - passwords we use for different services (for example, identical password for facebook and for bitcointalk.org, so if facebook account gets hacked, it's highly possible that bitcointalk.org gets hacked too);
 - many fine human qualities like stupidity, nonchalance, curiosity and inattention: passwords written on piece of paper and then sticked to monitors to be shown on youtube-video; "indifference" to URLs of sites where people plan to work with money (phishing, yes); irrepressible aspiration to read messages from tax service that tax service never sends; desire to tell everyone that you're Satoshi Nakamoto engaged in crypto currency - in other words, everything that can be described as "security ignorance".
(I'm sure I didn't mention them all.)

Their devices. Here we've got:
 - poorly protected operation systems: because you need to use Qubes OS but continue to use outdated and unconfigured Windows HP - or because you start everything with "root" privileges (it's better to include in "Themselves" paragraph though);
 - viruses, malwares, keyloggers and other "gifts" for antivirus-free machines (and for users who like to download the super-files from cool site letshackeverythingdotcom);
 - spy sly scripts, applications and browser extensions (which - of course! - they received from the same letshackeverythingdotcom).
(I'm sure I didn't mention them all.)

Methods and devices to connect. Here we've got:
 - our IPs;
 - leaky cheap routers;
 - sincere third-party workers who come to configure our leaky cheap routers;
 - curious neighbors (or curious neighbors' children) who decided to check if they're good hackers or not;
 - public WiFi's, which curious neighbors and their curious children use to check if they at least can "listen" to something that doesn't have a password;
 - poorly protected devices connected to home networks.
(I'm sure I didn't mention them all.)

Public Internet-services. Here we've got:
 - weak passwords for public Internet-services (e-mail, for example);
 - poor protection when you can use better protection (when someone doesn't use the 2fA, right);
 - autologin and "remember my password" - especially when you log in from device using by a bunch of people;
 - trivial security questions in social media or e-mails (for example, someone sets a question "the name of my dear kitty" for his/her social media account - when everybody knows everything about that kitty from his/her posts).
(I'm sure I didn't mention them all.)

We're surrounded, folks.
legendary
Activity: 2758
Merit: 6830
How long will it take to be implemented? I hope that this system will work when the new bitcointalk forum has been launched. Sending PM thru theymos and Cyrus really eats a lot of time.
I couldn't find the post. But I'll try better tomorrow.

IIRC, the PM was from ~1 month ago and theymos said that he would try to code it in a few weeks. So it should be out soon. So it will definitely be available in the current forum software (SMF), and not only when the new software comes out.

The problem with the current system is that there is too many PM's and just theymos and Cyrus to check, verify the messages, deal with the members and recover the accounts. And they probably have a lot to do other than spend their day recovering hacked/lost accounts.
legendary
Activity: 1904
Merit: 1563
I'm pretty sure this is already being worked on.

Give me a few minutes and I will find the PM someone received from theymos where he says that he is developing a system to automatically prove you own an account with your staked address.
How long will it take to be implemented? I hope that this system will work when the new bitcointalk forum has been launched. Sending PM thru theymos and Cyrus really eats a lot of time.
legendary
Activity: 2758
Merit: 6830
~
I'm pretty sure this is already being worked on.

Give me a few minutes and I will find the PM someone received from theymos where he says that he is developing a system to automatically prove you own an account with your staked address.
hero member
Activity: 672
Merit: 526
What is important to note is that many accounts have not been hacked. They are only frozen by some hacking attempt or by an attempt to change the email. As the process of defrosting the account or recovering it is manual and takes a lot of time.

Perhaps more important than 2fa, it would be automatization of the account recovery process. Using a signature from a BTC or pgp address. I think the forum should have an option to directly configure in the profile your BTC addresses and pgp that could never be changed. And only the admin could visualize them in an account recovery situation. Bitmex uses a similar system.
member
Activity: 336
Merit: 42
I think because of phishing sites like Bitcointalk.to

if you are not careful, you will believe that the domain Bitcointalk.to is the same with Bitcointalk.org but they are different!
legendary
Activity: 2772
Merit: 3284
Reuse of credentials is likely the most common reason, combined with the lack of 2FA offered on the forum. There are many database breaches (I believe BitcoinTalk also had one in 2015) from many notable sites that people may have had an account on. They would have used the same credentials on BitcoinTalk, and a hacker would have gone through the list of leaked account info and tried it against BitcoinTalk.
member
Activity: 378
Merit: 42
AhrvoDEEX FUTURE OF BROKERAGE TRANSACTIONS
I am very curious because recently I've seen a massive amount of threads regarding hacked accounts. I've seen different ranks being hacked despite their years of experience in the forum. I was just thinking maybe there are several factors or some stuff that made these people be vulnerable to being scammed or hacked. Meaning that these factors will make those years of experience useless.

I want to see how different users got hacked, then we can differentiate the pattern and procedure these hackers do.
This could be a serious problem so I would greatly appreciate any help from users who were hacked or know someone who was hacked.
It would be great if you guys can share with us your experience then I would edit this first post and quote those experiences. I also suggest make the "experience part" as short and as simple as possible too.

Thanks! Smiley

EDIT:
Here are some of community replies.

Reuse of credentials is likely the most common reason, combined with the lack of 2FA offered on the forum. There are many database breaches (I believe BitcoinTalk also had one in 2015) from many notable sites that people may have had an account on. They would have used the same credentials on BitcoinTalk, and a hacker would have gone through the list of leaked account info and tried it against BitcoinTalk.

I think because of phishing sites like Bitcointalk.to

if you are not careful, you will believe that the domain Bitcointalk.to is the same with Bitcointalk.org but they are different!


Users are not just nicknames in the computer world. They "consist" at least of:
 - themselves (the real persons who sleep, eat etc);
 - their devices (PCs, phones, laptops, tablets, smart TVs smart toasters etc);
 - ways to connect their devices to bitcointalk.org server or any-other-Internet-server (routers, WiFis, DNS etc);
 - public Internet-services related to themselves and bitcointalk.org or any-other-Internet-service.

And almost any of these can be vulnerable.

Themselves. Root of evil in most cases. Here we've got:
 - weak passwords (only lazybones didn't mention the weak passwords);
 - passwords we use for different services (for example, identical password for facebook and for bitcointalk.org, so if facebook account gets hacked, it's highly possible that bitcointalk.org gets hacked too);
 - many fine human qualities like stupidity, nonchalance, curiosity and inattention: passwords written on piece of paper and then sticked to monitors to be shown on youtube-video; "indifference" to URLs of sites where people plan to work with money (phishing, yes); irrepressible aspiration to read messages from tax service that tax service never sends; desire to tell everyone that you're Satoshi Nakamoto engaged in crypto currency - in other words, everything that can be described as "security ignorance".
(I'm sure I didn't mention them all.)

Their devices. Here we've got:
 - poorly protected operation systems: because you need to use Qubes OS but continue to use outdated and unconfigured Windows HP - or because you start everything with "root" privileges (it's better to include in "Themselves" paragraph though);
 - viruses, malwares, keyloggers and other "gifts" for antivirus-free machines (and for users who like to download the super-files from cool site letshackeverythingdotcom);
 - spy sly scripts, applications and browser extensions (which - of course! - they received from the same letshackeverythingdotcom).
(I'm sure I didn't mention them all.)

Methods and devices to connect. Here we've got:
 - our IPs;
 - leaky cheap routers;
 - sincere third-party workers who come to configure our leaky cheap routers;
 - curious neighbors (or curious neighbors' children) who decided to check if they're good hackers or not;
 - public WiFi's, which curious neighbors and their curious children use to check if they at least can "listen" to something that doesn't have a password;
 - poorly protected devices connected to home networks.
(I'm sure I didn't mention them all.)

Public Internet-services. Here we've got:
 - weak passwords for public Internet-services (e-mail, for example);
 - poor protection when you can use better protection (when someone doesn't use the 2fA, right);
 - autologin and "remember my password" - especially when you log in from device using by a bunch of people;
 - trivial security questions in social media or e-mails (for example, someone sets a question "the name of my dear kitty" for his/her social media account - when everybody knows everything about that kitty from his/her posts).
(I'm sure I didn't mention them all.)

We're surrounded, folks.


Jump to: