Author

Topic: CRYPTSY stopping withdraw locking accounts without notifying users! Class Action - page 272. (Read 1006940 times)

hero member
Activity: 550
Merit: 501
Gleb you a quite the pwner. Wink




CRYPTSY WAS AN INSIDE JOB!!!!!!!!!!



NEVER FORGET!!!!!!!!!!!!!!!!!!!!!!!!!!!

Line 111 and 143 are quite revealing..  DEC 2ND, 2015 is long before any announcement


http://pastebin.com/tFeXaXtM
hero member
Activity: 798
Merit: 531
Crypto is King.
Gleb you a quite the pwner. Wink




CRYPTSY WAS AN INSIDE JOB!!!!!!!!!!



NEVER FORGET!!!!!!!!!!!!!!!!!!!!!!!!!!!

Sprouts was an inside job too, dumped to hell.

PROOF IT!
I did my best to save Sprouts v1. Since I was only a bag hodler and not the original coin developer (MrEggMan), I lost wayyyyy too much in Sprouts too. I have speculated that it may have been a coin similar to CENT and was devised by a Cryptsy insider to pwn us all. Sad to say. Trying to get a partner to build Sprouts 2.0 with a lot of bug fixes. I haven't had a response yet. Sad

Just another reason why


FUCK YOU CRYPTSY

I mean


CROOKSY
legendary
Activity: 1726
Merit: 1018
Hacker...
Jop, N.P.M aka mullick aka cryptsy-hacker.

One very obvious question for teeny tiny vern would be, why didn't Mullick get shitcanned for the hack?  He was the wallet guy and according to his own words the network and server security guy.  I am inclined to believe the narrative that there never was a hack.
sr. member
Activity: 309
Merit: 250
Gleb you a quite the pwner. Wink




CRYPTSY WAS AN INSIDE JOB!!!!!!!!!!



NEVER FORGET!!!!!!!!!!!!!!!!!!!!!!!!!!!

Sprouts was an inside job too, dumped to hell.

PROOF IT!
hero member
Activity: 798
Merit: 531
Crypto is King.
Gleb you a quite the pwner. Wink




CRYPTSY WAS AN INSIDE JOB!!!!!!!!!!



NEVER FORGET!!!!!!!!!!!!!!!!!!!!!!!!!!!
hero member
Activity: 798
Merit: 1000
hero member
Activity: 868
Merit: 1000
Hacker... lol there was no hacker why are people even bothering with this line of reasoning/questions?
vip
Activity: 1428
Merit: 1145
Here's an interesting tidbit pertaining to the main event: https://www.walletexplorer.com/txid/c7b46a79fd8887038bd3a8e884b04820038415a60e0b9d2c2f5bcff68a2687bf

ALL the bitcoin wallet addresses that were reduced totaling 11325.0961 BTC and now reside comfortably numb in 12 BWAs (10X 1000 BTC; 1X 1325 BTC; 1X 0.0961 BTC) were NEVER used again by Cryptsy.

In re. the [first] minor event, ALL the bitcoin wallet addresses that were reduced totaling 500 BTC and now reside comfortably numb in 5 BWAs (5X 100 BTC) WERE used again by Cryptsy.

Who here, versed in security or not, would reuse a comprised bitcoin wallet address once in their control? It seems Paul Vernon and his head of security team didn't seem to have any problem reusing the addresses associated with the minor event, but had grave concerns with reusing the addresses associated with the main event.

Lorie Nettles: Paul, Marshall "Stinky" Long's wife called me earlier and she, too, wants him to get his dozens of laptops conducting CPU bitcoin mining out of the living room due to making too much noise, creating too much heat, and causing the air conditioner to run constantly creating more noise and heat, not to mention higher electric bills so that you two can enjoy a hobby created by some anonymous dude. We've teamed up and are forcing you guys to stop the madness or you'll both be seeking new Asian wives to tie up and fuck the living shit out of. Oh, and Ginny called wondering if you've seen Jim, saying that if he's not home by Thursday, she's goin' back to fuckin' her pigs and horses in the north forty.

The fact they did not see 500 BTC hack of hot wallet for hours is more than enough to point of the level of incompetence at Cryptsy.Hacker first robbed BTC hot wallet, 5 hours later XC and BTCD, than LTC and finally "cold" wallet.In previous exchanges hacks,hackers stayed very,very little time and they took only BTCs.In Cryptsy hack was on and on for 5-6 hours.Wallets were emptied one by one and nobody saw that.Unbelieveable.After hack they did not do anything to 24h monitor stolen coins and alarmed exchanges when it started to move.

Hack lasted for so long and this fact could point that he/she is not a pro-hacker or member of some organized high skilled group,but someone who was so lucky when got access to Cryptsy wallets that could not stop takeing coins and probably huge fan of BTCD and XC when he took these relatively worthless coins compared to BTC.Also he did not tumbling and mixing LTC,XC and BTCD ,but sent them directly to exchanges - something that experienced hacker would never do it.Unlike BTER and Bitstamp hackers,whose put BTCs into mixer in the matter of days after theft,this hacker  did not touch them for 1.5 year - it is very likely that after theft he was very afraid of what he did it and really did not know what to do with BTCs and how to laundry them before selling.


Exactly how does one hack a COLD WALLET that's not connected to the Internet, hence the term COLD WALLET?

Why didn't the hacker take ALL the bitcoins from the wallets, leaving odd amounts or change on some?

Why did the hacker take all that time to put the majority of booty into whole-number wallets, e.g. (illustration only), 1003.547066 BTC resides in a wallet, but the hacker takes only 1000 BTC, leaving the 3.547066 BTC that Cryptsy moves to another address shortly after the heist?

Why did Paul Vernon assure everybody who uses Cryptsy that he complies with SARs et al., but after the heist doesn't contact SARs within 60 days of losing over thirteen million dollars as declared by law stipulated in SARs docs he's obviously versed in, evidenced by his verbal and written mentions.

How does a person who once pass sensitive information to 3-, 4- and 5-Star Generals while serving in the Army protecting the US doesn't contact a proper authority knowing full well that a terrorist may now have access to over thirteen million dollars? Do you have any idea how much damage a terrorist can do in the US with having thirteen million dollars in their coffer? Hint: Thirteen times more damage than if having ONLY one million dollars at their disposal. Yet, Paul Vernon being the bright and trusted Army dude he is, failed to the nth degree in notifying a proper authority directly after the event.

What's the penalty for those conspiring to coverup the heist being that Paul stating that others were privy to the event?: Bryant Ibana; Horus; Mullick; among others, perhaps even Lorie Nettles. All MUST be questioned because for all we know national security is at stake for at least the US and Canada.

I'd say Paul Vernon fucked up big time by not reporting the potential terrorist threat.


"And why am I position to the far, far, far right of this post?
There's some weird-ass shit goin' down 'round here!"
hero member
Activity: 728
Merit: 500
Their incompetence is alright as long as they pay their customers Smiley
Bummer that won't happen, the hacker will always get back to them freely right under their nose.
sr. member
Activity: 916
Merit: 312
Here's an interesting tidbit pertaining to the main event: https://www.walletexplorer.com/txid/c7b46a79fd8887038bd3a8e884b04820038415a60e0b9d2c2f5bcff68a2687bf

ALL the bitcoin wallet addresses that were reduced totaling 11325.0961 BTC and now reside comfortably numb in 12 BWAs (10X 1000 BTC; 1X 1325 BTC; 1X 0.0961 BTC) were NEVER used again by Cryptsy.

In re. the [first] minor event, ALL the bitcoin wallet addresses that were reduced totaling 500 BTC and now reside comfortably numb in 5 BWAs (5X 100 BTC) WERE used again by Cryptsy.

Who here, versed in security or not, would reuse a comprised bitcoin wallet address once in their control? It seems Paul Vernon and his head of security team didn't seem to have any problem reusing the addresses associated with the minor event, but had grave concerns with reusing the addresses associated with the main event.

Lorie Nettles: Paul, Marshall "Stinky" Long's wife called me earlier and she, too, wants him to get his dozens of laptops conducting CPU bitcoin mining out of the living room due to making too much noise, creating too much heat, and causing the air conditioner to run constantly creating more noise and heat, not to mention higher electric bills so that you two can enjoy a hobby created by some anonymous dude. We've teamed up and are forcing you guys to stop the madness or you'll both be seeking new Asian wives to tie up and fuck the living shit out of. Oh, and Ginny called wondering if you've seen Jim, saying that if he's not home by Thursday, she's goin' back to fuckin' her pigs and horses in the north forty.

The fact they did not see 500 BTC hack of hot wallet for hours is more than enough to point of the level of incompetence at Cryptsy.Hacker first robbed BTC hot wallet, 5 hours later XC and BTCD, than LTC and finally "cold" wallet.In previous exchanges hacks,hackers stayed very,very little time and they took only BTCs.In Cryptsy hack was on and on for 5-6 hours.Wallets were emptied one by one and nobody saw that.Unbelieveable.After hack they did not do anything to 24h monitor stolen coins and alarmed exchanges when it started to move.

Hack lasted for so long and this fact could point that he/she is not a pro-hacker or member of some organized high skilled group,but someone who was so lucky when got access to Cryptsy wallets that could not stop taking coins and probably huge fan of BTCD and XC when he took these relatively worthless coins compared to BTC.Also he did not tumbling and mixing LTC,XC and BTCD ,but sent them directly to exchanges - something that experienced hacker would never do it.Unlike BTER and Bitstamp hackers,whose put BTCs into mixer in the matter of days after theft,this hacker  did not touch them for 1.5 year - it is very likely that after theft he was very afraid of what he did it and really did not know what to do with BTCs and how to laundry them before selling.


vip
Activity: 1428
Merit: 1145
Here's an interesting tidbit pertaining to the main event: https://www.walletexplorer.com/txid/c7b46a79fd8887038bd3a8e884b04820038415a60e0b9d2c2f5bcff68a2687bf

ALL the bitcoin wallet addresses that were reduced totaling 11325.0961 BTC and now reside comfortably numb in 12 BWAs (10X 1000 BTC; 1X 1325 BTC; 1X 0.0961 BTC) were NEVER used again by Cryptsy.

In re. the [first] minor event, ALL the bitcoin wallet addresses that were reduced totaling 500 BTC and now reside comfortably numb in 5 BWAs (5X 100 BTC) WERE used again by Cryptsy.

Who here, versed in security or not, would reuse a comprised bitcoin wallet address once in their control? It seems Paul Vernon and his head of security team didn't seem to have any problem reusing the addresses associated with the minor event, but had grave concerns with reusing the addresses associated with the main event.

Lorie Nettles: Paul, Marshall "Stinky" Long's wife called me earlier and she, too, wants him to get his dozens of laptops conducting CPU bitcoin mining out of the living room due to making too much noise, creating too much heat, and causing the air conditioner to run constantly creating more noise and heat, not to mention higher electric bills so that you two can enjoy a hobby created by some anonymous dude. We've teamed up and are forcing you guys to stop the madness or you'll both be seeking new Asian wives to tie up and fuck the living shit out of. Oh, and Ginny called wondering if you've seen Jim, saying that if he's not home by Thursday, she's goin' back to fuckin' her pigs and horses in the north forty.
sr. member
Activity: 784
Merit: 250
Added new coins for withdrawal.
vip
Activity: 1428
Merit: 1145
They finally figured out how the event happened: https://www.youtube.com/watch?v=Bsxiz7DFHuI (spoiler alert: last few seconds of the video, otherwise enjoy the entire video).
hero member
Activity: 798
Merit: 531
Crypto is King.
Pauly Pauly Pauly . . . you thieving son of a bitch.


 Big John is going to gape that asshole much wider than Bruno's famous eggnog enema device.



RUN HORUS!!!!!!!!!!!!!



You can only claim ignorance for a smidgen longer~~~!!!!!
hero member
Activity: 560
Merit: 500
I think the best part of this is the option of trying to sell a business with like -$50 million of liquid cash lol
If the banks can get bail outs from tax payers, why can't exchanges get bail outs from whatever suckers they can line up. Even if this happened. Who would use the site at this moment?  Maybe Horus can reassure people that the new owners are legit. Its fractional reserve right, all on the up and up. Banks do it after all. No reason to suspect criminal activity that needs reporting.
legendary
Activity: 2548
Merit: 1054
CPU Web Mining 🕸️ on webmining.io
I think the best part of this is Cryptsy giving the option of trying to sell a business with like -$50 million of liquid cash lol
vip
Activity: 1428
Merit: 1145
http://blog.cryptsy.com/

Quote
We do, however, fully comply with our Federal MSB requirements.  This includes filing SAR (Suspicous Activity Reports) and CTR (Currency Transaction Reports).  We also have one of the most extensive KYC programs in the industry, scrub accounts against the OFAC list, and perform Transaction Monitoring.   At a federal level, we are compliant.

https://en.wikipedia.org/wiki/Suspicious_activity_report

Quote
In the United States, FinCEN requires that an SAR be filed by a financial institution when the financial institution suspects insider abuse by an employee; violations of law aggregating over $5,000 where a subject can be identified;[clarification needed] violations of law aggregating over $25,000 regardless of a potential subject; transactions aggregating $5,000 or more that involve potential money laundering or violations of the Bank Secrecy Act; computer intrusion; or when a financial institution knows that a customer is operating as an unlicensed money services business.

Quote
Each SAR must be filed within 30 days of the date of the initial determination for the necessity of filing the report. An extension of 30 days can be obtained if the identity of the person conducting the suspicious activity is not known. At no time, however, should the filing of an SAR be delayed longer than 60 days. The Bank Secrecy Act specifies that each firm must maintain records of its SARs for a period of five years from the date of filing.

http://blog.cryptsy.com/

Quote
Some may ask why we didn’t report this to the authorities when this occurred, and the answer is that we just didn’t know what happened, didn’t want to cause panic, and were unsure who exactly we should be contacting.

Paul Vernon: Deposit on Cryptsy, Cryptsy is fun, come right now, don't walk - run!

Paul Vernon: Safe? Darn tootin'! We filing SAR (Suspicous Activity Reports) reports.

Paul Vernon: A year and half ago, over thirteen million dollars worth of cryptocurrencies was stolen from Cryptsy.

Paul Vernon: Why we didn’t report this to the authorities when this occurred? To be Marshall Long et al. honest, we were unsure who exactly we should be contacting.

Paul Vernon: We're reaching out to those of the community we haven't hammer-banned to help us hunt down the person(s) responsible for the event leaning to reduction of my... I mean ours... I mean your funds, offering up a reward of 1000 BTC coming out of mine... I mean ours... I mean our clients' pockets, their moneys on account.

http://www.anti-moneylaundering.com/pdf/Example_Fines_and_Penalties.pdf

Quote
Money transmitter with 7,500 agents. San Fernando, California. Failure to establish and implement an anti-money laundering program. Structuring. Failure to control and supervise agents. Failure to report Suspicious Transactions (SARs). Fine $12,000,000.

$13,000,000 - $12,000,000 =    ?   


"Don't know! Mongo only pawn in game of life.
vip
Activity: 1428
Merit: 1145
http://blog.cryptsy.com/

Quote
We do, however, fully comply with our Federal MSB requirements.  This includes filing SAR (Suspicous Activity Reports) and CTR (Currency Transaction Reports).  We also have one of the most extensive KYC programs in the industry, scrub accounts against the OFAC list, and perform Transaction Monitoring.   At a federal level, we are compliant.

https://en.wikipedia.org/wiki/Suspicious_activity_report

Quote
SARs include detailed information about transactions that are or appear to be suspicious. The goal of SAR filings is to help the government identify individuals, groups and organizations involved in fraud, terrorist financing, money laundering, and other crimes.

BRUNO: Hello, SARs, Bruno here. Yeah, I wish to filing a report for a missing over thirteen million dollars that may or may not be currently in control of rogue terrorists... Good point! All terrorists are considered rogue. My bad... No, the missing millions weren't mine but some other who claimed that he called the FBI but was referred to some unknown website named 13C and was awaiting back word from it which hasn't occurred yet according to dude's recent communiqué... When was the money stolen? On July 29, 2014. Why you laughing?... Yes, that's the guy. Paul Vernon. You're already on top of it? You sure?... So you don't need my help, eh? Not even for blockchain foren... On top of that, too, huh?... Nope, I guess that's it... Eggnog? You got me mixed up with some other dude. Later, bud.
vip
Activity: 1428
Merit: 1145
From the desk of I'm Doin' Horus' Job:

http://blog.cryptsy.com/

Quote
About a year and a half ago, we were alerted in the early AM of a reduction in our safe/cold wallet balances of Bitcoin and Litecoin, as well as a couple other smaller cryptocurrencies.

Quote

Time for me to look into #3 on the list, namely this bitcoin wallet address: 159m8sYcDJwPfJaVpLeKJitkQTiPKevnY4 pertaining to this tx: https://www.walletexplorer.com/txid/790aa7ec2678552c88cf95110c0df4bcc16a72b8f7e6f331292b977cc6e481df (image below)



First, let's look at Cryptsy's proclaimed COLD WALLET 18TfUhH5pN6pj7QEpLQBJThMxpydi2Gc4N (highlighted above), highlighting transactions on or near the date of the event.



The 10 BTC aside, note the 0.0001 BTC stemming from https://www.walletexplorer.com/txid/474e6c04aa9bf4e8627833d2215e7e736a1be25343831ed8b654e3d7b182e183 and being withdrawn approximately an hour and an half later here: https://www.walletexplorer.com/txid/8db95a057e10c029c06d7ca3353a4832b0fca201509c95653a591cae80d2be65

Somebody had to have had access to that COLD WALLET during a late Monday evening (July 28, 2014, EDT) to transfer that 0.0001 BTC, wouldn't they? And where did that scant coinage end up after being added to et al. via myriad Cryptsy controlled bitcoin wallet addresses?

Here: https://www.walletexplorer.com/address/1EzK7T326C3eU3pi4MWFDzUptg143vV4K5?page=35



"Here" being the 37 BTC (highlighted above) on the newly created Cryptsy bitcoin wallet address very shortly after the final event of the event: https://www.walletexplorer.com/txid/5a0046e495e68af04848e0acd373d239a2e36d66e78ecb370f8bc19a9e3df304
legendary
Activity: 1624
Merit: 1001
All cryptos are FIAT digital currency. Do not use.
I still don't know why you're harassing me with this shit. I was NEVER top echelon at Cryptsy, NEVER corporate. I've always been a low to mid-level employee. I understand looking into corporate level, but just because I have my face out there as PR last couple of months youre busting my balls. Again, I have done fuck all wrong and you keep staying on me as a topic. If a big bank fucks someone over, do you investigate the investigators? Makes no sense and y'all are grasping at straws now. I don't know why you have such a fuckin' hard on for me, I ain't that pretty Wink

Especially since you started to put on all that weight..

.. its as if you don't want people to easily recognize you. Tongue



It is a pretty safe assumption that you had top level access from the onset.


https://ca.linkedin.com/in/horus-thesun-48a56241


@Bruno
We should start a pool that guesses how many times BitJohn's spam bots refer to the craptsy support staff as "the team". Wink
Jump to: