Pages:
Author

Topic: I was scammed by MtGox. (Read 7844 times)

hero member
Activity: 686
Merit: 564
June 23, 2011, 02:02:07 PM
#52
It is very simple to match http logins with IP addresses.
This doesn't work if you've got a CSRF vulnerability in your website. Since it's the victim's browser carrying out the request on behalf of the attacker, no unusual IP addresses show up in the log. In fact, it's actually impossible to prove that a CSRF vulnerability hasn't been exploited from server logs, which is one of many suspicious things about MagicalTux's recent statements. (You can look at the referrer header, but there are ways for the attacker to blank this out, and many users' browsers don't send a referrer anyway.)
legendary
Activity: 1120
Merit: 1003
June 23, 2011, 01:40:18 PM
#51
So you created an account (that's the complete history, right?), just to put some coins there and about two hours later that money disappeared? I am sorry for my distrust, but with hat kind of title and TradeHill in your signature I think it all looks somewhat suspicious to me.

My thoughts exactly
full member
Activity: 168
Merit: 100
June 23, 2011, 01:09:02 PM
#50
So you created an account (that's the complete history, right?), just to put some coins there and about two hours later that money disappeared? I am sorry for my distrust, but with hat kind of title and TradeHill in your signature I think it all looks somewhat suspicious to me.

Hmm, I wonder if a pro Tradehill person had anything to do with the recent bleep hit the fan MT Gox hack ?
legendary
Activity: 1218
Merit: 1000
June 21, 2011, 09:59:52 AM
#49
sturle,

That's the "expect the worse" part, to that end I agree.
You can have security trough obscurity, but you can't think that obscurity may will stand forever.

Now, making everything open doesn't make nothing safer, actually it does the other way around as a potential attacker would know what and where to look for. Making open is a security breach by nature.
legendary
Activity: 1437
Merit: 1002
https://bitmynt.no
June 21, 2011, 09:54:15 AM
#48
There're a few wrong concepts on your idea sturdle.
There IS security trough obscurity. This a simple fact, you can't know what you don't see.
Just the fact that you can't see it doesn't make it unknown.  It can even be visible and in plain sight, you just don't know what to look for or where to look.  Treat as much as possible as if it is visible to everyone, and it won't hurt you if it is.  Make sure to protect what you need to protect.  A password is simple to protect.  If you need to protect the password hash to protect your password, you have lost because the hash isn't under your control.
legendary
Activity: 1218
Merit: 1000
June 21, 2011, 09:11:50 AM
#47
There're a few wrong concepts on your idea sturdle.
There IS security trough obscurity. This a simple fact, you can't know what you don't see.

The idea of "open everything" is the ultimate insecure protocol, for the following main reasons:

- The attacker will know exactly what he is after.
- A regular user by seeing a hashed pass will believe to be facing the ultimate uncrackable thing on Earth, as no matter how weak the hash it will look like mumbo-jumbo to him.
- Computing power is expanding by the day. MD5 was safe for the computing power back in the 90's, isn't anymore today. Same will happen to SHA-512 in time being.

The whole idea must be to have a set of password and use them according. Your car key is by far more complex than the one to open your bike's chain; still you need to have a way to open and start your car (remember in the case of passwords) it otherwise you would be on foot.
legendary
Activity: 1437
Merit: 1002
https://bitmynt.no
June 21, 2011, 08:41:39 AM
#46
Btw, if your password was cracked from a salted MD5 hash, it wasn't secure.  By definition.  Secure passords can't be cracked in finite time with todays technology, even when given the hash.
I'm a bit sick and tired with this load of "I'm a security expert" BS! Stop blaming it on users!
Let your db to leak into the web is way more serious than use even 123 as password. There's no way to blame this guy, except that MtGox hasn't "scam him", he just opened an account at a place with a lousy service.
Just ten years ago password files, YP, etc with password hashes in the open was the norm.  A crackable password was  as good as a plaintext password.  Passwords had to be good, and the openness ensured that people made good passwords.

Unfortunately after September 1994 a lot of clueless newbies entered the Internet.  Users who had no idea about passwords, security or computers or networks in general.  Also passwords had to be made more and more complex due to increasing computing power available to malicious users.  During the last few years systems have tried to remedy the problem a bit by hiding the hashes from public view.  I'm not sure if this is a good idea or not.

This kind of security by obscurity is false.  First and most important: it is impossible to know if your password is stored in a properly salted and secure hash, or if it is kept in an open database or hashed in an insecure way (NTLM springs to mind).   Secondly: users tend to make bad assumptions about cracking being difficult, and make bad passwords. 

Treat all password databases as open.  Make good and unique passwords, and you are secure if the password database use properly salted and hashed passwords.  (If not the site isn't secure anyway.)

Don't trust "security experts", btw.  People calling themselves experts on computer security typically have little or no real knowledge about security.  Just have a look around this forum for proof.  Real security experts can be recognised by i.e. the lack of firewalls and open WiFi at their home, but would never claim to be an expert on such a complex field.
legendary
Activity: 1218
Merit: 1000
June 20, 2011, 10:09:07 PM
#45
Btw, if your password was cracked from a salted MD5 hash, it wasn't secure.  By definition.  Secure passords can't be cracked in finite time with todays technology, even when given the hash.

I'm a bit sick and tired with this load of "I'm a security expert" BS! Stop blaming it on users!
Let your db to leak into the web is way more serious than use even 123 as password. There's no way to blame this guy, except that MtGox hasn't "scam him", he just opened an account at a place with a lousy service.
legendary
Activity: 1437
Merit: 1002
https://bitmynt.no
June 20, 2011, 10:35:56 AM
#44
Why would I lie?

I even provided a picture for proof
You are still claiming you were scammed by Mt.Gox, and this picture shows an entirely different scenario.  So you are either lying or trying to prove something else.

Btw, if your password was cracked from a salted MD5 hash, it wasn't secure.  By definition.  Secure passords can't be cracked in finite time with todays technology, even when given the hash.
newbie
Activity: 15
Merit: 0
June 19, 2011, 06:48:15 PM
#43
It is very simple to match http logins with IP addresses.  Any sane trading/currency site would do this logging so if it looks like this:

XX/XX/XXXX XX:XX:XX a.a.a.a - San Diego, CA - Comcast - example
XX/XX/XXXX XX:XX:XX a.a.a.a - San Diego, CA - Comcast - example
XX/XX/XXXX XX:XX:XX a.a.a.a - San Diego, CA - Comcast - example
XX/XX/XXXX XX:XX:XX b.b.b.b - Evil Hacker Town, China - ChinaNet - example

Then it would be pretty clear from their side if an account was hacked.  Mt. Gox is the only one who knows for sure.

Hopefully the logging server is intact.

EDIT: assuming the same account.
full member
Activity: 238
Merit: 100
June 19, 2011, 04:57:46 PM
#42
I feel your pain.
I too got BTC stolen from mtgox because of the comprimise, and its been reported to mtgox for a while now (who repeately denied it to all of us that got robbed)

Now lets see if the do the right thing, and refund the money to us that was lost due to their negligence and lack of security. (20.19 BTC in my case)
full member
Activity: 168
Merit: 100
June 19, 2011, 04:36:47 PM
#41
Guys, stop telling me I need to change my password. For anything important, I never reuse a password from a different site. I had a secure alphanumeric password as well. My account was COMPROMISED, like a lot of other users here.

Let me reemphasize that I am not the only one affected. Please read the entire thread and see the link that someone posted earlier.

MtGox on the issue, addressing the security hole:
legendary
Activity: 2114
Merit: 1040
A Great Time to Start Something!
June 19, 2011, 03:05:30 PM
#40
@OP: MtGox made over $40,000 in legit profits on the days when BTC was around $30. They did not steal your coins.


So you created an account (that's the complete history, right?), just to put some coins there and about two hours later that money disappeared? I am sorry for my distrust, but with hat kind of title and TradeHill in your signature I think it all looks somewhat suspicious to me.

This is either a dirt-bag phoney (no offense intended) or the OP has a serious keylogger/virus on their PC.
@OP: If you are honest, then you honestly need to clean up your computer, IMO.
sr. member
Activity: 406
Merit: 256
June 18, 2011, 02:48:30 PM
#39
Looks like it was a security problem at mtgox.com

http://forum.bitcoin.org/index.php?topic=18709.0

You probably visited another site that had custom code that used your active mtgox.com session to get in and do the transfer.



MagicalTux went through the logs for Mt. Gox and confirmed that was never exploited except in the test.
member
Activity: 84
Merit: 10
June 18, 2011, 02:45:03 PM
#38
The whole point of digital cash is that it has the same benefits and liabilities as real cash.  If you want security, stay with bank notes and credit cards.  If you want freedom, it is riskier by definition.
jr. member
Activity: 56
Merit: 1
June 18, 2011, 02:25:47 PM
#37
I believe that he should reimburse those affected.
Well… Anyone having done a withdrawal recently could claim thief.
We see the limits of 2-way trust here… That is the price we pay for enhanced privacy I guess.
full member
Activity: 238
Merit: 100
June 18, 2011, 11:28:40 AM
#36
I have stepped forward on a few other posts - I also had money stolen from my MtGox account (20.19 BTC)
I even reported it to MtGox with no reply (this report was made before it was announced that there was a security exploit found).
It has recently been revealed that MtGox did in fact have a vulnerability, and someone even showed them the exploit by using it to prove it was there. There are also a dozen or so of us that have had this happen. Yet, the owner claimed that he can see no evidence in his logs that our money was lost due to the exploit, and that he is not going to refund anybody for the BTC stolen from his (insecure) site.
I for one will never use MtGox again.  Its one thing to make a mistake and have such a simple exploit left open it happens. Its another thing to not own up to your responsibilities as a responsible business owner. Look at the number of trades on his market, look at his fee and do the math.  Bottom line is that he makes very good money from his userbase, and should be trivial to do the right thing for a few handfuls of users that lost modest amounts of bitcoins.  I don't know if it can be proven one way or another whether or not the withdrawn funds were via an exploit or not - but honestly, look at the evidence

Edit:
Also, I want to point out that I'm not claiming that I was "scammed" by MtGox.  I do however believe that the lack of security features on the site, and the exploit that was discovered are responsible for my stolen bitcoins, and I believe that he should reimburse those affected.  To those mentioning brute force attacks on passwords, I think its a security vulnerability in its self that an account isn't suspended after X failed login attempts.
legendary
Activity: 1876
Merit: 1000
June 18, 2011, 10:50:26 AM
#35

It does seam suspicious that the poster is advertising for tradehill!!!!!
legendary
Activity: 1050
Merit: 1003
June 18, 2011, 05:04:23 AM
#34
I'm concerned that negative comments directed at people whose money has been stolen are driven by self-interested concern about their effects on the exchange rate. Of course thefts affect the exchange rate, but it is much better to have hacking problems exposed, so that Mt. Gox can be fixed or abandoned instead of shutting everyone up and waiting for something really serious to happen (again Allinvain counts as serious in my book). Some of you people are like listening to directives from the CCP Ministry of Truth. 'This is all a conspiracy of the imperialist bankers seeking to discredit bitcoin' Covering up problems until they explode is not a good approach. Thanks to everyone who is reporting thefts and vulnerabilities for helping to improve security.
sr. member
Activity: 254
Merit: 250
June 18, 2011, 04:43:25 AM
#33
I use this http://strongpasswordgenerator.com/ for strong password generator to generate secure passwords
Pages:
Jump to: