Author

Topic: Forum database compromised? (Read 3141 times)

legendary
Activity: 1456
Merit: 1000
October 22, 2016, 10:49:16 AM
#36
Nah, I run my own email servers - definitely not found by guessing - I'd see the other attempts.
However, it is the same email I've had here for 5 years, but the first time I've had spam sent to it.
If you have had the email on your bitcointalk profile (even hidden counts), than it was probably in the forum data breach from 2015. I don't think it was very easily obtainable/required a payment to get it until recently, since I've noticed that sites like leakedsource have added the database. I suggest searching your email up in https://www.leakedsource.com/ and see if it is from that leak.

I think this is likely the source if he had it so long.  As I don't know if we really know what they did with the DB at this point.  I remember them logging into inactive accounts like Mt. Gox and such trolling.

At the time I was curious how much info they got and mentioned something about them being a scypt kiddie or something in META and asked to impress me and give my IP.  They were able to do it at the time....  So I don't know what all data got out but know my IP at the time was part of it.  I hope no new hacks like that one have happened.
sr. member
Activity: 374
Merit: 250
October 21, 2016, 09:58:57 PM
#35
can confirm that my unique email-address which I have on this site is getting spam too. So something has been leaked from this site.

I found it odd that you were getting these spams, since you're showing 1 activity point. Then I checked your profile and it shows that it was created in 2013. So you created a profile over 3 years ago and this is your 1st post?  Shocked
Its also odd that he did not make any posts in all these years but came back to post about the Forum database being compromised.

I know this was 10 days ago, but it really is weird. I wonder what's the story behind it.
legendary
Activity: 952
Merit: 1002
October 11, 2016, 11:35:02 PM
#34
can confirm that my unique email-address which I have on this site is getting spam too. So something has been leaked from this site.

I found it odd that you were getting these spams, since you're showing 1 activity point. Then I checked your profile and it shows that it was created in 2013. So you created a profile over 3 years ago and this is your 1st post?  Shocked
Its also odd that he did not make any posts in all these years but came back to post about the Forum database being compromised.
sr. member
Activity: 374
Merit: 250
October 11, 2016, 07:49:23 PM
#33
can confirm that my unique email-address which I have on this site is getting spam too. So something has been leaked from this site.

I found it odd that you were getting these spams, since you're showing 1 activity point. Then I checked your profile and it shows that it was created in 2013. So you created a profile over 3 years ago and this is your 1st post?  Shocked
newbie
Activity: 28
Merit: 0
October 11, 2016, 07:28:01 AM
#32
Hi there,

i also get Spam since last week, my adress too was only known to this board.
interesting is that i got spam on that adress last week for the first time.

i would recommend to send another roundmail since the phished adresses now are beeing spammed.

Greetings
newbie
Activity: 1
Merit: 0
October 11, 2016, 05:37:15 AM
#31
can confirm that my unique email-address which I have on this site is getting spam too. So something has been leaked from this site.
sr. member
Activity: 374
Merit: 250
October 11, 2016, 03:26:19 AM
#30
Where the emails encrypted?
I don't believe so. In the email concerning the hack theymos said that our Email addresses were "likely leaked". I assume that this means they were stored in plain text.

I'm so embarrassed that I wrote "where."

So basically someone paid 1 BTC to spam us. That's so freaking lame. Someone made a 1 BTC profit at the expense of us.
legendary
Activity: 2352
Merit: 1268
In Memory of Zepher
October 11, 2016, 03:10:56 AM
#29
Where the emails encrypted?
I don't believe so. In the email concerning the hack theymos said that our Email addresses were "likely leaked". I assume that this means they were stored in plain text.
sr. member
Activity: 374
Merit: 250
October 11, 2016, 01:39:51 AM
#28
That's exactly where I'm getting my spam email, "Bitcoin Market." It really sucked seeing that my email was now getting spam. So I'm guessing it was from that compromise. Were the emails encrypted?
legendary
Activity: 854
Merit: 1000
October 10, 2016, 04:46:39 PM
#27
To my knowledge, the recent DDOS attacks were just annoying. I haven't heard anything from Theymos about a security breach or potential security breach. If one had happened, or even if there was the slightest suspicion that someone could have gained access to any forum private information, Theymos would have warned everyone and asked that they changed their account details.
Totally agree with you.If there eas any kind of data stealing,Theymos would be the first person to know about that and he would have warned us.Moreover if hackers had info about our accounts,they would have sold most of high rank accounts
legendary
Activity: 2352
Merit: 1268
In Memory of Zepher
October 10, 2016, 04:20:27 AM
#26
i did not receive any spam in the mail i registered here,when was the forum compromised ,do we all need to change the password now.
Unless you have another account, you signed up over a year after the database was leaked. Therefore, your email won't have been in the leak.
In regards to changing your password, you should change your password regularly anyway. If you haven't changed it in a while, you can do it now.
sr. member
Activity: 246
Merit: 250
October 10, 2016, 03:02:04 AM
#25
i did not receive any spam in the mail i registered here,when was the forum compromised ,do we all need to change the password now.
newbie
Activity: 27
Merit: 0
October 09, 2016, 08:50:07 PM
#24

Sans looking, for I'm ready to hit the hay, I think I have a copy of that dump.

Yes nothing says scammer and liar like keeping a copy of a dumped hacked database. Oh wait yes something else does say scamming liar like that, and it is, https://bitcointalksearch.org/topic/gleb-gamow-bruno-kucinskas-is-a-scammer-a-thief-a-liar-and-an-extortionist-1012713 The true Gleb for all to see.
vip
Activity: 1428
Merit: 1145
October 07, 2016, 02:37:27 AM
#23
Nah, I run my own email servers - definitely not found by guessing - I'd see the other attempts.
However, it is the same email I've had here for 5 years, but the first time I've had spam sent to it.
If you have had the email on your bitcointalk profile (even hidden counts), than it was probably in the forum data breach from 2015. I don't think it was very easily obtainable/required a payment to get it until recently, since I've noticed that sites like leakedsource have added the database. I suggest searching your email up in https://www.leakedsource.com/ and see if it is from that leak.

Sans looking, for I'm ready to hit the hay, I think I have a copy of that dump.
hero member
Activity: 896
Merit: 1006
October 07, 2016, 12:29:47 AM
#22
Well thank god for that. The email that I use for this forum is my main email and I would really hate if that started to get a load of spam messages from advertising companies.

The passwords went trough a strong hashing algorithm, the emails are probably stored in plain text... I've never seen anybody encrypt emails for things like a forum.... So, expect some spam in your main mailbox Sad
hero member
Activity: 532
Merit: 501
October 06, 2016, 11:46:33 PM
#21
IIRC, Theymos is using doublesha256 to store the password in the database so if your password is pretty decent it would be a long time before its compromised.

That would be *very* weak as a password hashing algorithm, and I doubt this is true. Simple Machines Forum seems to use salted sha1 as the default.

Edit: On LeakedSource, it says very old passwords were hashed with md5 and newer ones were hashed with sha256crypt (which is salted and slow).

I remember Theymos saying somewhere that he heavily invested (40 bitcoin) in setting up extremely strong password hashing.

Passwords defenitely not stored in plaintext, then Smiley
Well thank god for that. The email that I use for this forum is my main email and I would really hate if that started to get a load of spam messages from advertising companies.
member
Activity: 105
Merit: 59
October 06, 2016, 09:08:00 AM
#20
Overnight, I got the same email to both my butterfly labs email address and bitcointalk address.
legendary
Activity: 1232
Merit: 1030
give me your cryptos
October 05, 2016, 11:11:42 PM
#19
IIRC, Theymos is using doublesha256 to store the password in the database so if your password is pretty decent it would be a long time before its compromised.

That would be *very* weak as a password hashing algorithm, and I doubt this is true. Simple Machines Forum seems to use salted sha1 as the default.

Edit: On LeakedSource, it says very old passwords were hashed with md5 and newer ones were hashed with sha256crypt (which is salted and slow).

I remember Theymos saying somewhere that he heavily invested (40 bitcoin) in setting up extremely strong password hashing.

Passwords defenitely not stored in plaintext, then Smiley
legendary
Activity: 2590
Merit: 2156
Welcome to the SaltySpitoon, how Tough are ya?
October 05, 2016, 10:39:48 AM
#18
This is all in relation to the 2015 database leak, there hasn't been any compromise lately:
Quote from: theymos
Passwords are hashed with 7500 rounds of sha256crypt and a unique salt per password (roughly equivalent to bcrypt with work=12.8). This is very strong. But nothing's going to stop extremely weak passwords from being broken.

Theymos has mentioned the possibility that other Bitcoin related sites and services may have had their databases leaked as well, and those with the same emails and passwords as here would have been compromised. As he said above, the passwords are encrypted pretty well. 
legendary
Activity: 952
Merit: 1002
October 05, 2016, 10:22:09 AM
#17
IIRC, Theymos is using doublesha256 to store the password in the database so if your password is pretty decent it would be a long time before its compromised.

That would be *very* weak as a password hashing algorithm, and I doubt this is true. Simple Machines Forum seems to use salted sha1 as the default.

Edit: On LeakedSource, it says very old passwords were hashed with md5 and newer ones were hashed with sha256crypt (which is salted and slow).
IIRC, Theymos reset the passwords of very old accounts and the only way to get back access is via email.

Its highly probable that Theymos reset the passwords of accounts without salt too or accounts using the old hashing algorithm.
member
Activity: 105
Merit: 59
October 05, 2016, 10:08:21 AM
#16
IIRC, Theymos is using doublesha256 to store the password in the database so if your password is pretty decent it would be a long time before its compromised.

That would be *very* weak as a password hashing algorithm, and I doubt this is true. Simple Machines Forum seems to use salted sha1 as the default.

Edit: On LeakedSource, it says very old passwords were hashed with md5 and newer ones were hashed with sha256crypt (which is salted and slow).
legendary
Activity: 952
Merit: 1002
October 05, 2016, 09:47:04 AM
#15
It is always a good practice to change your password if you believe that the forum database was compromised.

IIRC, Theymos is using doublesha256 to store the password in the database so if your password is pretty decent it would be a long time before its compromised.
newbie
Activity: 7
Merit: 0
October 05, 2016, 09:26:52 AM
#14
I am also seeing this. I use a unique email address that is a long string of random alphanumeric characters - too many to guess. It was added to my bitcoin talk account February 2013.

One from "BitCoin-Carrding" [email protected], and just now 'Eden Smizaski invited you to view the file "WorldPay_Trade_Report_-_ September 2016.zip" on Dropbox.' which is a zipfile full of nasty obfuscated javascript.

Can confirm, got the same email to a 100% unique email address. I can guarantee you that this email was not used anywhere else.

Database was definitely compromised. (probably the 2015 hack) and finally spreading now.

https://maurits.tv/data/img/October%202016/2016-10-05_16-24-56_Gca8ETgZXI.png
member
Activity: 105
Merit: 59
October 05, 2016, 09:18:23 AM
#13
I am also seeing this. I use a unique email address that is a long string of random alphanumeric characters - too many to guess. It was added to my bitcoin talk account February 2013.

One from "BitCoin-Carrding" [email protected], and just now 'Eden Smizaski invited you to view the file "WorldPay_Trade_Report_-_ September 2016.zip" on Dropbox.' which is a zipfile full of nasty obfuscated javascript.
hero member
Activity: 1022
Merit: 538
October 05, 2016, 05:08:31 AM
#12
To my knowledge, the recent DDOS attacks were just annoying. I haven't heard anything from Theymos about a security breach or potential security breach. If one had happened, or even if there was the slightest suspicion that someone could have gained access to any forum private information, Theymos would have warned everyone and asked that they changed their account details.
So it's just people trying to be idiots and annoy the people on this forum. If there was no security threat then I don't even know why we are talking about it.
member
Activity: 114
Merit: 11
October 05, 2016, 02:36:11 AM
#11
D-DOS has nothing to do with database compromise. D-DOS is just trick of newbies to try to overflow the server's bandwidth. It's not even level 1 security breach.
member
Activity: 92
Merit: 10
October 05, 2016, 02:18:28 AM
#10
ddos attack and they stole accounts thats impossible right?
legendary
Activity: 4592
Merit: 1851
Linux since 1997 RedHat 4
October 04, 2016, 10:28:54 PM
#9
If they got your email due to to database being hacked, then they most likely would mass send their spam to extend their possible reach.

So far I have not received any email spam since the very beginning of me joining here.

What also happens is that spam mail bots simply send out made up emails to people in the hope they guess them right.

For example, they send emails to [email protected] [email protected] and the list goes on.

All in the hope that one or more of these mails are guessed correctly.
Nah, I run my own email servers - definitely not found by guessing - I'd see the other attempts.
However, it is the same email I've had here for 5 years, but the first time I've had spam sent to it

If you run your own mail servers, could one of them get compromised somehow giving out your email addresses? Also, are you absolutely sure that you didn't share this email somewhere yourself? I've seen a lot of cases when people did something and then honestly claimed that they didn't do that only to get greatly surprised to find out later that it was actually them...

How old are you? Just kidding, lol
None of the many email servers I've been running for the last 15 years have yet to be compromised.
I did once have a computer at home running linux, compromised once ... back around 1998.

Lulz I guess you mistakenly give your email address out Tongue

As I said above, I have over 700 (with many domains I own), coz each one only gets given to one place.
Helps with spam a lot - easy to delete one email address without affecting anything else - and know who was compromised.

I had 3 addresses on adobe and yep those 3 got spam soon after adobe was compromised a while back.
I had one on the bfl web site that got spam, though they probably sold the email list Tongue
Probably had half a dozen places in the last 5 years where the sites have either been compromised or given out their address list ...

But fortunately in each case I simply have to delete the address with zero care.
I keep a few very old addresses that get spam, for filter training - they get something of the order of 500 spam messages each day.
legendary
Activity: 3514
Merit: 1280
English ⬄ Russian Translation Services
October 04, 2016, 10:26:08 AM
#8
If they got your email due to to database being hacked, then they most likely would mass send their spam to extend their possible reach.

So far I have not received any email spam since the very beginning of me joining here.

What also happens is that spam mail bots simply send out made up emails to people in the hope they guess them right.

For example, they send emails to [email protected] [email protected] and the list goes on.

All in the hope that one or more of these mails are guessed correctly.
Nah, I run my own email servers - definitely not found by guessing - I'd see the other attempts.
However, it is the same email I've had here for 5 years, but the first time I've had spam sent to it

If you run your own mail servers, could one of them get compromised somehow giving out your email addresses? Also, are you absolutely sure that you didn't share this email somewhere yourself? I've seen a lot of cases when people did something and then honestly claimed that they didn't do that only to get greatly surprised to find out later that it was actually them...

How old are you? Just kidding, lol
legendary
Activity: 2772
Merit: 3284
October 04, 2016, 08:54:02 AM
#7
Nah, I run my own email servers - definitely not found by guessing - I'd see the other attempts.
However, it is the same email I've had here for 5 years, but the first time I've had spam sent to it.
If you have had the email on your bitcointalk profile (even hidden counts), than it was probably in the forum data breach from 2015. I don't think it was very easily obtainable/required a payment to get it until recently, since I've noticed that sites like leakedsource have added the database. I suggest searching your email up in https://www.leakedsource.com/ and see if it is from that leak.
legendary
Activity: 4592
Merit: 1851
Linux since 1997 RedHat 4
October 04, 2016, 05:36:11 AM
#6
If they got your email due to to database being hacked, then they most likely would mass send their spam to extend their possible reach.

So far I have not received any email spam since the very beginning of me joining here.

What also happens is that spam mail bots simply send out made up emails to people in the hope they guess them right.

For example, they send emails to [email protected] [email protected] and the list goes on.

All in the hope that one or more of these mails are guessed correctly.
Nah, I run my own email servers - definitely not found by guessing - I'd see the other attempts.
However, it is the same email I've had here for 5 years, but the first time I've had spam sent to it.

But yes my comment about DDoS was of course implying that it wasn't Smiley

Ah well, I have about 700 email addresses for this reason, time to close this one and create another new one ...
... and I've again received that spam twice more in the last couple of hours Tongue
legendary
Activity: 1526
Merit: 1179
October 04, 2016, 05:29:09 AM
#5
If they got your email due to to database being hacked, then they most likely would mass send their spam to extend their possible reach.

So far I have not received any email spam since the very beginning of me joining here.

What also happens is that spam mail bots simply send out made up emails to people in the hope they guess them right.

For example, they send emails to [email protected] [email protected] and the list goes on.

All in the hope that one or more of these mails are guessed correctly.
A!
full member
Activity: 155
Merit: 100
October 04, 2016, 04:13:31 AM
#4
When you started using your email? It is a general knowledge that the forum database was compromised a couple of times in the past.
hero member
Activity: 896
Merit: 1006
October 04, 2016, 04:04:11 AM
#3
A DDOS has nothing to do with potential security breaches... The "hackers" just send so many requests a service stops responding... Hence the name "Distributed Denial Of Service" Wink

Stealing database information is something completely different, and since Theymos only reported a DDOS, i don't think there should be a problem.

The database was leaked over a year ago tough... Do you still have the same email on file as you did a year ago? If this is the case, they just might be started sending spam emails to the database they got back then (but this is old news).
legendary
Activity: 2590
Merit: 2156
Welcome to the SaltySpitoon, how Tough are ya?
October 04, 2016, 04:00:25 AM
#2
To my knowledge, the recent DDOS attacks were just annoying. I haven't heard anything from Theymos about a security breach or potential security breach. If one had happened, or even if there was the slightest suspicion that someone could have gained access to any forum private information, Theymos would have warned everyone and asked that they changed their account details.
legendary
Activity: 4592
Merit: 1851
Linux since 1997 RedHat 4
October 04, 2016, 03:43:09 AM
#1
I take it that in one of the recent forum ddos's the database was hacked?

I have an email address that is only here on the forum and no where else.

Yesterday I received  spam to that email address, and the spam was bitcoin related.

My email is (and always has been) hidden.

Thus the only reason this would happen would be one of:
1) Someone guessed my forum email address (unlikely)
2) the forum database was compromised.

Most of the spam email header:

Code:
Return-Path:
Received: from maambacoal.com (mail.maambacoal.com [209.133.7.59] (may be forged))
by *** with ESMTP id u93LOoWp022675
for ***; Tue, 4 Oct 2016 08:24:51 +1100
Received: (qmail 30426 invoked by uid 89); 3 Oct 2016 21:24:50 -0000
Received: from unknown (HELO mail.draftcargoways.com) ([email protected]@209.11.159.25)
  by maambacoal.com with ESMTPA; 3 Oct 2016 21:24:50 -0000
Received: (qmail 27651 invoked by uid 89); 3 Oct 2016 21:24:48 -0000
Received: from unknown (HELO 185.125.4.158) ([email protected]@185.125.4.158)
  by mail.draftcargoways.com with ESMTPA; 3 Oct 2016 21:24:48 -0000
Message-ID:
Reply-To: "Bitcoin Market"
From: "Bitcoin Market"
To: ***
Subject: Samsung S6 Edge = 99$ (Black market Haacking)
Date: Mon, 3 Oct 2016 23:24:47 -0700
Organization: Bitcoin Market
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----=_NextPart_000_17AB_01D21DCD.550BE5F0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Windows Live Mail 14.0.8117.416
X-MimeOLE: Produced By Microsoft MimeOLE V14.0.8117.416
Jump to: