And now?
I personally think it's a good idea to collect as much data on what happened as possible. Please report in if you got hit as well, and answer the following questions:
* How much funds did you lose?
* To what address were your stolen funds sent?
* What OS are you using (Windows, Linux, Mac OSX ...)?
* How long was your old password?
* Was your old password random?
* Was your username the same on Mt. Gox as on the forum?
* Did you use your Mt. Gox password somewhere else?
* Did your old password contain lowercase letters, uppercase letters, special characters and numbers?
* Have you used any Bitcoin-related software, and if yes, what software? Think about things like miners, wallet managers, etc.
* Please also include a screenshot if possible so we know it's a real report.
let's think this out. if you are someone with access to the Mt. Gox data, including usernames and password hashes, wouldn't the bolded information be particularly useful for said individuals to bruteforce crack and abuse? there is zero reason why anyone would need to disclose this type of information on a public forum, and even less reason why anybody would ask of this type of data.
why do you ask for specific data on the length of passwords, whether they were random, the character types contained, and whether their username is the same on here as on Mt. Gox? furthermore, the request for OS type, bitcoin software and a screenshot of their account info? are you looking for direct targets to hack?
this, to me at least, screams of someone trying to social engineer more lulz and/or theft from data in their possession.
for added info on JoePie91 -
https://twitter.com/#!/TeaMp0isoN_and there are allegations that lulzsec is behind the Mt. Gox hack. consider that info, then consider how unusual the initial post is.
Wow, you registered just to try and discredit me?
Let's start with the password information. First off, the very first thing that is recommended in the post is to
change passwords,
not reuse passwords and
use a password with a different length. The reason I ask for this information is to find out what possible attack vectors were for compromised accounts. Second off, adding the questions about whether someone reused username or password elsewhere was
on request of someone else (on IRC I believe).
Then the OS information. Yet again, this was to determine what attack vectors could have been used. If people using non-Windows systems, for example, got compromised as well, that would make a keylogger and/or other malware very unlikely.
Then on to the software. It's a bit sad I even have to explain this - obviously the question is whether the compromise may be due to Bitcoin-related software that someone has been running, that may have had malware attached to it.
Then the screenshot. The very line about the screenshot says it all. If you would have been involved in the community here even a bit (instead of registering a new account after Googling joepie91 or however you may have ended up here), you would have known that there were already several reports when this thread was made, and that their validity was disputed (was it a ploy by Tradehill? Or another exchange? Or was it people trying to discredit Bitcoin? etc etc). So obviously the next question is a screenshot to prove that it happened. Seeing as a screenshot does not have to contain anything besides the record of it being transfered away, this is not a problem privacy- or security-wise. It cannot even be used to track it back to other addresses from the same person, as coins going through Mt. Gox get mangled up.
Then the "looking for direct targets to hack" claim. I am a programmer / webdev, and not a cracker (which is the correct term for what you are talking about). My greatest "cracking" achievement to date is finding a vulnerability in Mt. Gox that makes use of a combination of two known techniques to compromise accounts with passwords with less than 6 characters (a vulnerability that I have, after days, STILL not received a response about from MagicalTux). I have absolutely no fucking clue whatsoever how to SQLi a site in such a way that I can actually do something - my knowledge ends at ' OR 1=1.
Then the most retarded claim of all - Lulzsec. First of all the allegations that I am a part of Lulzsec are complete bullshit, and so far all of these allegations originate from the same source - a "leaked" IRC log that was claimed to be from a Lulzsec channel. The only problem is that it wasn't a Lulzsec channel. Since then media, blogs and Twitter users, have been parrotting these allegations without any kind of actual proof - except for an IRC log that was not from the place it was claimed to be from.
Second off, there can be a million allegations of Lulzsec "being behind the Mt. Gox hack" - however, not only is that highly improbable (why would they fuck around with something they like and actively use?), but also is there absolutely zero proof whatsoever that that is the case. Innocent until proven guilty and all that.
Now consider the postcount of said user
stubeans, consider his signup date, consider his countless allegations without any facts to support it (except for other alleged 'facts' that were themselves never proven), consider his hostile attitude, consider how he blindly copies the two capital letters in my nickname from a Twitter feed despite me not using any capital letters anywhere (indicating he has no idea who I actually am, and has never seen me anywhere before).
And now consider how unusual and full of bullshit said user is.
Seriously, go back to your troll cave.