Author

Topic: CRYPTSY stopping withdraw locking accounts without notifying users! Class Action - page 311. (Read 1006940 times)

sr. member
Activity: 406
Merit: 250
You guys really think Cryptsy is scamming us?

Look at Vern, how could someone with such body language be lying to us all  Roll Eyes

https://www.youtube.com/watch?v=dJONR_UL1rw

He was mostly nervous about being interviewed on Camera.. i don't blame him.

Paul Vernon: Where are you guys from again?
Reporter: Acme News.
Paul Vernon: No, seriously, which three-letter agency you from?
Reporter: Seriously, Acme News.
Paul Vernon: Okay, I guess then I can take my hands outta my pockets. Wanna see my dance moves?

Reporter: Solvency is a big issue when it comes to exchanges
Vern: Reddit is blowing our insolvency issue way out of proportion
Vern: We don't have a large withdraw pending in our queue

What Vern did not say (read between the lines) is, "we do not have a problem with solvency"
legendary
Activity: 2940
Merit: 1333
If anyone dropped the ball, maybe Mullick... he always struck me as a shady character... he was in charge of wallets and almost certainly knew about the theft 18 months ago...

Mullick fixed the backdoor in a public fork of the lucky7coin repo. in April 2015.

If the hack happened in July 2014 why did Mullet wait until April of 2015 to fix the lucky7 wallet code on github?  I believe cryptsy had lucky7 listed the entire time did they not?

https://github.com/Mullick/lucky7coin/commit/799b0b6b65a8fdd827d0d1406868d34a045ea779

It is also worth noting that this github commit is more than a month after Dooglus pointed out the issue https://github.com/alerj78/lucky7coin/issues/1

One possible explanation is that he was trying to hide any evidence of having been hacked and so he fixed the backdoor in a private copy of the repository. But when he noticed that I had published details of the backdoor it would look bad if he didn't respond by fixing it publicly.

you are only seen has the cunts

It's "as":

    "you are only seen as the cunts"
hero member
Activity: 631
Merit: 501
I didn't know either of those existed.
I'll check them out!
full member
Activity: 126
Merit: 100
With all the issues with centralized exchanges -- run by people... I am seriously surprised someone hasn't come up with a de-centralized exchange platform.  Not controlled by any one person... but by the network itself.


Well I know http://www.instantdex.org/
I'm not sure it is very active yet.
Most people like trading on the most active exchanges ...
vip
Activity: 1428
Merit: 1145
With all the issues with centralized exchanges -- run by people... I am seriously surprised someone hasn't come up with a de-centralized exchange platform.  Not controlled by any one person... but by the network itself.


https://bitsquare.io/

hero member
Activity: 631
Merit: 501
With all the issues with centralized exchanges -- run by people... I am seriously surprised someone hasn't come up with a de-centralized exchange platform.  Not controlled by any one person... but by the network itself.
vip
Activity: 1428
Merit: 1145
Maybe it's crazy but this and other similar situations of coins being stolen demonstrates the benefit of having a way to reverse transactions.

Perhaps we should consider a mechanism to reverse a transaction through a vote or consensus. Haven't fully thought out how this could work but it is something to consider.

Something could be designed to allow miners to reverse a specific transaction (and all subequest tx's) through majority consensus in extreme situations such as this.

Mistakes and thefts happen. Fiat banks have the ability to correct mistakes and reverse transactions unless the funds are withdrawn for cash.

I dunno...just thinking out loud.


No thinking out loud! Meanwhile, https://www.walletexplorer.com/txid/7a5c9594195f9a8bdb45a0750808fbf3f67571f930aa5383724c622d5c06b221 ---> https://www.walletexplorer.com/wallet/00862671d40dec80 --> https://www.walletexplorer.com/wallet/1209a3e1e5699dbb --> https://www.walletexplorer.com/wallet/6e3ce4f373b6106d --> UNSPENT
66378 UNSPENT BITCOINS THAT COME FROM CRYPTSY LAUNDERING WALLETS JUST BEFORE AND AFTER THE "OMGGGTEHHAX0RRZZZ" WTF ADD ANOTHER $25,000,000.00+ TO THE STOLEN LIST



https://www.walletexplorer.com/wallet/6e3ce4f373b6106d - 1AhTjUMztCihiTyA4K6E3QEpobjWLwKhkR - it is Coinbase cold wallet






Interesting,
A few things led me to this thread. I was reading through some Bitcoin related Articles across a few websites, basically Headline Link Hopping for a few hours. And I found this Article.
http://www.dailydot.com/lifestyle/800-bitcoin-recovered-mt-gox/

It is about a man who accidentally sent 800 BTC to his old abandon MtGox deposit address about a month ago He (He made a Reddit post about this when it happened). Than just recently was able to get those coins returned to him after Contacting a Lawyer & Someone(??) at Gox. A unrelated person made a new Reddit post pointing out that the 800 BTC has left the address that they were sent to. So checked out the btc address for my self on Blockchain.info, That address is 113MmkyjjH6zS9VMvbwrhBNoMe6upzdvNC. I could see the 800 being deposited, and a previous 300 deposited in the past, And that the 800 had been split up and sent out in blocks of 200. I decided to follow the btc and see were this massive chuck of money may end up. 3 Clicks later I found the 800 btc has landed in this MAMMOTH address currently holding 22,125.4 btc Equal to $13,990,000. That address is 1AhTjUMztCihiTyA4K6E3QEpobjWLwKhkR. A quick Google search of that address has led me to this form. It is one of the address mentioned by the OP.

Dont know what it is, or what it means. Just showing the connection.

https://blockchain.info/address/113MmkyjjH6zS9VMvbwrhBNoMe6upzdvNC (Original address)
https://blockchain.info/address/1L5GAkFZiATZoBeEyWgDYpPReKWeCdzzeT
https://blockchain.info/address/1NRRqvaDvzFK7Pp6KWzmacMzgFHFD2yeCM
https://blockchain.info/address/1AhTjUMztCihiTyA4K6E3QEpobjWLwKhkR    (Current address)

I, too, found this thread by happenstance after discovering that the https://blockchain.info/address/1AhTjUMztCihiTyA4K6E3QEpobjWLwKhkR BWA was indirectly funded via BFL's https://blockchain.info/address/1QAHVyRzkmD4j1pU5W89htZ3c6D6E7iWDs BWA once pretending it was HashTrade's BWA when they supposedly paid the $1M USD via BTC down payment for Monarch miners using BitPay as the payment provider. ALL A LIE!
vip
Activity: 1428
Merit: 1145


That does not check HTTPS URL's ..only HTTP

HTTP redirects to HTTPS so it will show you if it's up

no i checked when Cryptsy got DDOS'd before.. i too posted that link but it don't work (isup.me)

Don't believe me ?
easy way to test it.. wait till Cryptsy is back up and check again using HTTPS and HTTP

maybe the databases get currrently downloaded? hopefully we will see leaked dumps soon and remember don't start executeables included in the leaked files, like in the good old mt gox leak days Wink

https://api.cryptsy.com/ still works and now redirects to the main site.

That's interesting! Now, we can hook up to the API, inject a Trojan, wait, then steal Paul's cat.
vip
Activity: 1428
Merit: 1145




ONLY 49 votes and 25 reviews out of over 30,000 users. Fuckin' amazing!
vip
Activity: 1428
Merit: 1145
You guys really think Cryptsy is scamming us?

Look at Vern, how could someone with such body language be lying to us all  Roll Eyes

https://www.youtube.com/watch?v=dJONR_UL1rw

Who the hell was the guy walking into the office with a drink ?
Fed's ?
He was staff that i ever seen.

I was leaning toward it being Bryant Ibana, but that may not be the case. Maybe Mullick will tell us.
vip
Activity: 1428
Merit: 1145
http://whois.domaintools.com/cryptsy.com

IP Address    192.230.69.5 is hosted on a dedicated server    
  IP Location    Japan - Tokyo - Tokyo - Incapsula Inc
ASN    Japan AS19551 INCAPSULA - Incapsula Inc (registered Jan 12, 2011)

Scan Result TCP Port Scan 
Params:    192.230.69.5
Raw output
Save as pdf

https://pentest-tools.com/network-vulnerability-scanning/tcp-port-scanner-online-nmap

Starting Nmap 6.00 ( http://nmap.org ) at 2016-01-16 21:19 EET
Initiating Ping Scan at 21:19
Scanning 192.230.69.5 [4 ports]
Completed Ping Scan at 21:19, 0.03s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 21:19
Scanning 192.230.69.5.ip.incapdns.net (192.230.69.5) [100 ports]
Discovered open port 25/tcp on 192.230.69.5
Discovered open port 443/tcp on 192.230.69.5
Discovered open port 8888/tcp on 192.230.69.5
Discovered open port 53/tcp on 192.230.69.5
Discovered open port 80/tcp on 192.230.69.5
Discovered open port 8080/tcp on 192.230.69.5
Discovered open port 444/tcp on 192.230.69.5
Discovered open port 7070/tcp on 192.230.69.5
Discovered open port 9100/tcp on 192.230.69.5
Discovered open port 5000/tcp on 192.230.69.5
Discovered open port 88/tcp on 192.230.69.5
Discovered open port 8000/tcp on 192.230.69.5
Discovered open port 10000/tcp on 192.230.69.5
Discovered open port 6000/tcp on 192.230.69.5
Discovered open port 9999/tcp on 192.230.69.5
Discovered open port 2000/tcp on 192.230.69.5
Discovered open port 81/tcp on 192.230.69.5
Discovered open port 389/tcp on 192.230.69.5
Discovered open port 8443/tcp on 192.230.69.5
Discovered open port 2049/tcp on 192.230.69.5
Discovered open port 8081/tcp on 192.230.69.5
Discovered open port 5060/tcp on 192.230.69.5
Completed SYN Stealth Scan at 21:19, 1.47s elapsed (100 total ports)

  • Nmap scan report for 192.230.69.5.ip.incapdns.net (192.230.69.5)
Host is up (0.0010s latency).
Not shown: 78 filtered ports

PORT      STATE SERVICE
25/tcp    open  smtp
53/tcp    open  domain
80/tcp    open  http
81/tcp    open  hosts2-ns
88/tcp    open  kerberos-sec
389/tcp   open  ldap
443/tcp   open  https
444/tcp   open  snpp
2000/tcp  open  cisco-sccp
2049/tcp  open  nfs
5000/tcp  open  upnp
5060/tcp  open  sip
6000/tcp  open  X11
7070/tcp  open  realserver
8000/tcp  open  http-alt
8080/tcp  open  http-proxy
8081/tcp  open  blackice-icecap
8443/tcp  open  https-alt
8888/tcp  open  sun-answerbook
9100/tcp  open  jetdirect
9999/tcp  open  abyss
10000/tcp open  snet-sensor-mgmt


You're port scanning Incapsula, which is basically a Anti-DDoS proxy for Cryptsy. Impossible to port scan Cryptsy now unless you find their hidden domain and they didn't firewall it off again. I can't find it now, but Gleb posted a while back about their internal network being exposed to the internet and it was indexed by shodan. The domain was provestnet.net, so feel free to check that out I guess. It's probably locked down now though.

wwwroot.cryptsy.com
website.cryptsy.com
blog.cryptsy.com
homedir.cryptsy.com
pop.cryptsy.com
web.cryptsy.com
ww.cryptsy.com
webserver.cryptsy.com
webcache.cryptsy.com
search.cryptsy.com
mysql.cryptsy.com
messages.cryptsy.com
https.cryptsy.com
webaccess.cryptsy.com
web2.cryptsy.com
my.cryptsy.com
webguide.cryptsy.com
www-dev.cryptsy.com
webinterface.cryptsy.com
webmail.cryptsy.com
http.cryptsy.com
webdev.cryptsy.com
wwww.cryptsy.com
smtp.cryptsy.com
weblog.cryptsy.com
websurveys.cryptsy.com
api.cryptsy.com
email.cryptsy.com
home.cryptsy.com
httpd.cryptsy.com
mail.cryptsy.com
www0.cryptsy.com
web0.cryptsy.com
webadmin.cryptsy.com
web1.cryptsy.com
www.cryptsy.com
www2.cryptsy.com
www1.cryptsy.com
sr. member
Activity: 324
Merit: 250
You guys really think Cryptsy is scamming us?

Look at Vern, how could someone with such body language be lying to us all  Roll Eyes

https://www.youtube.com/watch?v=dJONR_UL1rw

He was mostly nervous about being interviewed on Camera.. i don't blame him.

Paul Vernon: Where are you guys from again?
Reporter: Acme News.
Paul Vernon: No, seriously, which three-letter agency you from?
Reporter: Seriously, Acme News.
Paul Vernon: Okay, I guess then I can take my hands outta my pockets. Wanna see my dance moves?


Think about how he felt after he lost millions of dollars. I think the weirdest thoughts where running through his head while "surviving" the inverview
vip
Activity: 1428
Merit: 1145


That does not check HTTPS URL's ..only HTTP

Get back on your med, for it has always work for https://bitcointalk.org. You fuck up one more time and back to Hippy's camp I go. Hope he has munchies.
vip
Activity: 1428
Merit: 1145
You guys really think Cryptsy is scamming us?

Look at Vern, how could someone with such body language be lying to us all  Roll Eyes

https://www.youtube.com/watch?v=dJONR_UL1rw

He was mostly nervous about being interviewed on Camera.. i don't blame him.

Paul Vernon: Where are you guys from again?
Reporter: Acme News.
Paul Vernon: No, seriously, which three-letter agency you from?
Reporter: Seriously, Acme News.
Paul Vernon: Okay, I guess then I can take my hands outta my pockets. Wanna see my dance moves?

sr. member
Activity: 324
Merit: 250

seems the last trade was at the RDD market 4500 pieces @ 644 sat Smiley
that was today  Wink

yeah and the RDD market still has active orders, all other markets are already canceled, at least it the API doesn't provice active orders for them
legendary
Activity: 1344
Merit: 1251


That does not check HTTPS URL's ..only HTTP

HTTP redirects to HTTPS so it will show you if it's up

no i checked when Cryptsy got DDOS'd before.. i too posted that link but it don't work (isup.me)

Don't believe me ?
easy way to test it.. wait till Cryptsy is back up and check again using HTTPS and HTTP

maybe the databases get currrently downloaded? hopefully we will see leaked dumps soon and remember don't start executeables included in the leaked files, like in the good old mt gox leak days Wink

https://api.cryptsy.com/ still works and now redirects to the main site.

not true, Crytsy API is still up and i can still access the "trading" API from here, plcaing trades isn't possible but they still provide the user balances

Well it's not that useful to see your balance and just think "yeah, that's a lot of money, I wish I could have it back"...
hero member
Activity: 798
Merit: 1000

seems the last trade was at the RDD market 4500 pieces @ 644 sat Smiley
that was today  Wink
sr. member
Activity: 324
Merit: 250


That does not check HTTPS URL's ..only HTTP

HTTP redirects to HTTPS so it will show you if it's up

no i checked when Cryptsy got DDOS'd before.. i too posted that link but it don't work (isup.me)

Don't believe me ?
easy way to test it.. wait till Cryptsy is back up and check again using HTTPS and HTTP

maybe the databases get currrently downloaded? hopefully we will see leaked dumps soon and remember don't start executeables included in the leaked files, like in the good old mt gox leak days Wink

https://api.cryptsy.com/ still works and now redirects to the main site.

not true, Crytsy API is still up and i can still access the "trading" API from here, plcaing trades isn't possible but they still provide the user balances

seems the last trade was at the RDD market 4500 pieces @ 644 sat Smiley - 01/16/16 10:01 AM
sr. member
Activity: 324
Merit: 250


That does not check HTTPS URL's ..only HTTP

HTTP redirects to HTTPS so it will show you if it's up

no i checked when Cryptsy got DDOS'd before.. i too posted that link but it don't work (isup.me)

Don't believe me ?
easy way to test it.. wait till Cryptsy is back up and check again using HTTPS and HTTP

maybe the databases get currrently downloaded? hopefully we will see leaked dumps soon and remember don't start executeables included in the leaked files, like in the good old mt gox leak days Wink

https://api.cryptsy.com/ still works and now redirects to the main site.

not true, Crytsy API is still up and i can still access the "trading" API from here, plcaing trades isn't possible but they still provide the user balances
Jump to: