Pages:
Author

Topic: MtGox UPDATE - page 2. (Read 24209 times)

newbie
Activity: 28
Merit: 0
June 19, 2011, 08:43:33 PM
#67
got an alert from google, someone's been trying to log into my gmail acct.  That is on the MT.Gox database.

My gmail pass was different, and I have changed it.

this is a reminder to me to go around to all the sites and change the pw.

Same thing happened to me. I had a different PW from the PW that was on my MtGox site but I got that notification from Gmail. Maybe that was a notifications that people were trying to brute force it or test it against the ones they'd cracked in that list or something? This is just a total guess but I definitely had the same situ that you had.

According to what I read in #bitcoin-dev, someone from the community who's working at Google got hold of the dump and flagged all the gmail addresses he could find as possibly compromised for safety reasons. So while this is probably nothing to worry about if you didn't use your Mt. Gox password anywhere else, you should immediately change it if you did.

Bravo to gmail if that is the case.  Luckily I use different passwords for everything important and several different ones for things unimportant.  However, I was still greeted with a 'change your password due to suspicious activity' when logging into gmail.
sr. member
Activity: 294
Merit: 250
June 19, 2011, 08:34:40 PM
#66
And what about the users who had their accounts compromised in the past few weeks or so?

Many were trolls who lied, IMO.
A password hash does not allow you to login. The mysterious big account might have had a virus/key-logger on his PC.
I have had $200 vanish from my account. I have turned my PC upside down, including manual analysis and found no malware of any kind. I had a 20 character alphanumeric mixed case KeePass-generated random password. I was not a victim of the CSRF exploit as I could not reach the Mt. Gox site (thus wasn't logged in) at the moment the funds were stolen. Someone could easily break such a password by using a service like Amazon AWS - and it would actually pay off as you are trying to compromise accounts on a financial service that holds money. Not to mention that miners have hardware that is specifically suited for hashcracking.

Now tell me with a straight face that this was not related to the database leak.

Lol at a guy who is in LulzSec complaining on here about losing $200.

To be honest I think you have bigger things to worry about than losing $200 Sven. You losing your money has given me much Lulz! I suppose you must approve of that! There will also be much Lulz when you are arrested by your local police force. Smiley

http://lulzsecexposed.blogspot.com/2011/06/joepie-doxed.html
Yes, because everything you read on the internet is absolutely and completely true. Do some research before you claim things. I am not a part of Lulzsec, and I'm not involved in what they do. If you had actually read a bit *more* than just one single blog, you would have found that the supposed "Lulzsec channel" was not actually a Lulzsec channel, and that the dox and/or information on that site are grossly inaccurate (Barrett Brown a part of Lulzsec? REALLY?)

Get a clue before you shout.

I've read more than that blog, and I realise the logs weren't from the LulzSec channel. However, the logs show you assisting them, no matter what channel it's from. The dox on there might be bullshit (other than yours) but the logs are genuine, regardless of the channel. You might not be in the main crew, but you're in deep with those fucks.

You're a disgusting little cunt and I'm glad you've got even a tiny portion of what's coming for you. Your buddy Sabu hit the FBI. Do you know what that means? He's going to get caught. As soon as they catch him, the American's are going to try and extradite you under RICO laws. You've been seen on IRC handling their money and the Blockchain will confirm this. Under RICO legislation, that's enough to make you complicit.

You better hope and pray that the Dutch government doesn't roll over and extradite you. Either way you've got a tough autumn and winter coming up. You've bitten off more than you can chew here, son. I'd be very, very scared if I was you.
Assuming, assuming, and more assuming. It would be nice if you kept assumptions, personal attacks, insults, and fearmongering (oh, how original) off these threads, and actually focus on doing something constructive.
hero member
Activity: 504
Merit: 500
FPGA Mining LLC
June 19, 2011, 07:53:33 PM
#65
got an alert from google, someone's been trying to log into my gmail acct.  That is on the MT.Gox database.

My gmail pass was different, and I have changed it.

this is a reminder to me to go around to all the sites and change the pw.

Same thing happened to me. I had a different PW from the PW that was on my MtGox site but I got that notification from Gmail. Maybe that was a notifications that people were trying to brute force it or test it against the ones they'd cracked in that list or something? This is just a total guess but I definitely had the same situ that you had.

According to what I read in #bitcoin-dev, someone from the community who's working at Google got hold of the dump and flagged all the gmail addresses he could find as possibly compromised for safety reasons. So while this is probably nothing to worry about if you didn't use your Mt. Gox password anywhere else, you should immediately change it if you did.
newbie
Activity: 47
Merit: 0
June 19, 2011, 07:40:06 PM
#64
It's now approximately 20 minutes until Mt. Gox is supposed to resume service. Will this happen in time, or will it be delayed further?
newbie
Activity: 28
Merit: 0
June 19, 2011, 07:20:34 PM
#63
got an alert from google, someone's been trying to log into my gmail acct.  That is on the MT.Gox database.

My gmail pass was different, and I have changed it.

this is a reminder to me to go around to all the sites and change the pw.

Same thing happened to me. I had a different PW from the PW that was on my MtGox site but I got that notification from Gmail. Maybe that was a notifications that people were trying to brute force it or test it against the ones they'd cracked in that list or something? This is just a total guess but I definitely had the same situ that you had.

full member
Activity: 210
Merit: 100
June 19, 2011, 07:13:57 PM
#62
And what about the users who had their accounts compromised in the past few weeks or so?

Many were trolls who lied, IMO.
A password hash does not allow you to login. The mysterious big account might have had a virus/key-logger on his PC.
I have had $200 vanish from my account. I have turned my PC upside down, including manual analysis and found no malware of any kind. I had a 20 character alphanumeric mixed case KeePass-generated random password. I was not a victim of the CSRF exploit as I could not reach the Mt. Gox site (thus wasn't logged in) at the moment the funds were stolen. Someone could easily break such a password by using a service like Amazon AWS - and it would actually pay off as you are trying to compromise accounts on a financial service that holds money. Not to mention that miners have hardware that is specifically suited for hashcracking.

Now tell me with a straight face that this was not related to the database leak.

Lol at a guy who is in LulzSec complaining on here about losing $200.

To be honest I think you have bigger things to worry about than losing $200 Sven. You losing your money has given me much Lulz! I suppose you must approve of that! There will also be much Lulz when you are arrested by your local police force. Smiley

http://lulzsecexposed.blogspot.com/2011/06/joepie-doxed.html
Yes, because everything you read on the internet is absolutely and completely true. Do some research before you claim things. I am not a part of Lulzsec, and I'm not involved in what they do. If you had actually read a bit *more* than just one single blog, you would have found that the supposed "Lulzsec channel" was not actually a Lulzsec channel, and that the dox and/or information on that site are grossly inaccurate (Barrett Brown a part of Lulzsec? REALLY?)

Get a clue before you shout.

I've read more than that blog, and I realise the logs weren't from the LulzSec channel. However, the logs show you assisting them, no matter what channel it's from. The dox on there might be bullshit (other than yours) but the logs are genuine, regardless of the channel. You might not be in the main crew, but you're in deep with those fucks.

You're a disgusting little cunt and I'm glad you've got even a tiny portion of what's coming for you. Your buddy Sabu hit the FBI. Do you know what that means? He's going to get caught. As soon as they catch him, the American's are going to try and extradite you under RICO laws. You've been seen on IRC handling their money and the Blockchain will confirm this. Under RICO legislation, that's enough to make you complicit.

You better hope and pray that the Dutch government doesn't roll over and extradite you. Either way you've got a tough autumn and winter coming up. You've bitten off more than you can chew here, son. I'd be very, very scared if I was you.
hero member
Activity: 574
Merit: 513
June 19, 2011, 07:12:33 PM
#61
Also come chat in #bitcoin-onlyonetv on Freenode IRC network.  If you don't have an IRC client, visit http://webchat.freenode.net


MTGOX BREAKING NEWS

We will do one hour with the TradeHill guys LIVE via Skype.... at 9pm to 10pm ET tonight.

Then, we will do one hour with the MtGox guys LIVE via telephone from Tokyo.... at 10pm to 11pm ET tonight.

Go to http://onlyonetv.com and click the "Watch Live" button now... and join in the Live Chatroom.

See All Time Zones here:  http://goo.gl/ZqQRq

sr. member
Activity: 294
Merit: 250
June 19, 2011, 06:59:21 PM
#60
And what about the users who had their accounts compromised in the past few weeks or so?

Many were trolls who lied, IMO.
A password hash does not allow you to login. The mysterious big account might have had a virus/key-logger on his PC.
I have had $200 vanish from my account. I have turned my PC upside down, including manual analysis and found no malware of any kind. I had a 20 character alphanumeric mixed case KeePass-generated random password. I was not a victim of the CSRF exploit as I could not reach the Mt. Gox site (thus wasn't logged in) at the moment the funds were stolen. Someone could easily break such a password by using a service like Amazon AWS - and it would actually pay off as you are trying to compromise accounts on a financial service that holds money. Not to mention that miners have hardware that is specifically suited for hashcracking.

Now tell me with a straight face that this was not related to the database leak.

Lol at a guy who is in LulzSec complaining on here about losing $200.

To be honest I think you have bigger things to worry about than losing $200 Sven. You losing your money has given me much Lulz! I suppose you must approve of that! There will also be much Lulz when you are arrested by your local police force. Smiley

http://lulzsecexposed.blogspot.com/2011/06/joepie-doxed.html
Yes, because everything you read on the internet is absolutely and completely true. Do some research before you claim things. I am not a part of Lulzsec, and I'm not involved in what they do. If you had actually read a bit *more* than just one single blog, you would have found that the supposed "Lulzsec channel" was not actually a Lulzsec channel, and that the dox and/or information on that site are grossly inaccurate (Barrett Brown a part of Lulzsec? REALLY?)

Get a clue before you shout.
hero member
Activity: 695
Merit: 502
PGP: 6EBEBCE1E0507C38
June 19, 2011, 06:56:46 PM
#59
got an alert from google, someone's been trying to log into my gmail acct.  That is on the MT.Gox database.

My gmail pass was different, and I have changed it.

this is a reminder to me to go around to all the sites and change the pw.
hero member
Activity: 686
Merit: 564
June 19, 2011, 06:44:26 PM
#58
if this is what they say about whats happening, i guarantee its the truth.

i've dealt with these guys extensively in the past several months and they've delivered on everything they've promised.  be calm, everything's under control.

A few days before their entire user database was publicly published, someone was trying to flog it for sale. MagicalTux insisted that it was a lie, that there was no way it could've been leaked. We know how well they delivered on that promise.
full member
Activity: 210
Merit: 100
June 19, 2011, 06:36:04 PM
#57
And what about the users who had their accounts compromised in the past few weeks or so?

Many were trolls who lied, IMO.
A password hash does not allow you to login. The mysterious big account might have had a virus/key-logger on his PC.
I have had $200 vanish from my account. I have turned my PC upside down, including manual analysis and found no malware of any kind. I had a 20 character alphanumeric mixed case KeePass-generated random password. I was not a victim of the CSRF exploit as I could not reach the Mt. Gox site (thus wasn't logged in) at the moment the funds were stolen. Someone could easily break such a password by using a service like Amazon AWS - and it would actually pay off as you are trying to compromise accounts on a financial service that holds money. Not to mention that miners have hardware that is specifically suited for hashcracking.

Now tell me with a straight face that this was not related to the database leak.

Lol at a guy who is in LulzSec complaining on here about losing $200.

To be honest I think you have bigger things to worry about than losing $200 Sven. You losing your money has given me much Lulz! I suppose you must approve of that! There will also be much Lulz when you are arrested by your local police force. Smiley

http://lulzsecexposed.blogspot.com/2011/06/joepie-doxed.html
sr. member
Activity: 1344
Merit: 264
bit.ly/3QXp3oh | Ultimate Launchpad on TON
June 19, 2011, 06:24:58 PM
#56
they wont let me sign in. Ideas?

Read the news, the news that is everywhere right now.
Read their front page, which explains it.
full member
Activity: 154
Merit: 100
June 19, 2011, 06:24:35 PM
#55
Emailed issued few minutes ago from the mt.gox

Dear Sir or Madam,


A few hours ago the Bitcoin trading website Mt Gox has been hacked. Malicious individuals have been able to obtain a database containing usernames, email address and encrypted passwords. This information has been posted publicly on the internet.

As a Bitcoin supporter I'm now sending a message to every email address contained in the hacked database. This is to warn you that your username, email address and password have been leaked. I therefore strongly advice you to change your passwords. If you have used the same password on different websites it's highly recommended to change your password on all of your accounts!

For a more secure alternative to Mt Gox, the community appears to be moving to TradeHill. So this is no reason to lose faith in Bitcoin itself. It must be seen as a warning that not every website can be trusted with your data however! Their link is http://www.tradehill.com/?r=TH-R15683 (Note: You can remove the Referral Code when registering if you want!) This is certainly not the only website where you can exchange Bitcoins, also check out http://www.thebitcoinlist.com/dp_bitcoin/bitcoin-exchange/


Sincerely,

A Bitcoin supporter
1CWSjov2N7ix41bZ8bJfHXkdLLbkUsG9Y7
legendary
Activity: 2156
Merit: 1072
Crypto is the separation of Power and State.
June 19, 2011, 06:08:28 PM
#54
Please post any questions you have here and I'll do my best to answer.

When is MtGox going to pay for, and publish results from, a professional security audit?


If you want to be a real online broker, you need to invest in Wells-Fargo levels of vulnerability analysis.

Start with NTOSpider On-Demand, http://www.ntobjectives.com/ntoondemand, to get an idea of where you stand.

Then you need to hire an experienced consultant to make sure everything is absolutely bulletproof.

I HIGHLY recommend Strategic Data Command of Oakland, CA.  Larry Suto is among the best at what he does.

It might cost you a small fortune, but if you want results you need to call in world-class experts.

I will repost this same bit of advice to our Tradehill rep. as well.
full member
Activity: 154
Merit: 100
June 19, 2011, 06:00:11 PM
#53
any way you swing dipshit there is accountability and the fact they are the case to our emails and other financial institutions where compermised  do to their lack of security which leaves them open for liabilities weather they like it or not.
Someone has your email and login and now if its the same as what you used for Dwolla or paypal now your fucked buddy
you will learn troll.
hero member
Activity: 574
Merit: 513
June 19, 2011, 05:56:57 PM
#52
My question is, given all that has occured: Why should anyone be stupid enough to do that? Especially given the fact, that this is not the first case of less than transparent behaviour by MtGox.

This is simple!!

MagicalTux has a vested interest in more users using the site because of the 0.65% transaction fee for every trade.  TradeHill also I think with 0.6% transaction fee.  Thus, it is likely for them to preserve and maintain a reputable acceptance from community at any extent so as to preserve their profitability.

In my opinion, this seems the basis for a kind of corruption of openness and honesty that is paramount within open source mentality/community.  e.g. proprietary (* through obscurity) vs open source.

Also my opinion, I would be more comfortable with supporting (voting with my bitcoins and usage of) a more open exchange (openness in terms of quick and honest responses, to the point, blunt, etc), as opposed to one that delays and spends time on producing more nice sounding message and especially one that is not entirely accurate or believable especially with previous misleading, false, inaccurate or blatantly wrong/lying type of statements/claims.
legendary
Activity: 2940
Merit: 1333
June 19, 2011, 05:52:36 PM
#51
Many were trolls who lied, IMO.
A password hash does not allow you to login.

60000 password hashes, where 26 of them used the password "password", 11 used the password "abc123", 7 used the password "bitcoin" 3 used the password "secret" and 1 used the password "fuck" - that lets you log in.

I don't have a GPU, and my CPU is slow, but it's still trivial to find (some) passwords given enough hashes.  With a little more effort it's possible to find the combination of weak password and high balance.
legendary
Activity: 2156
Merit: 1072
Crypto is the separation of Power and State.
June 19, 2011, 05:45:09 PM
#50
i would deffently think twice using mtgox for the service do the fact they have taken down access to our accounts and we have to take a 3rd parties advice to settle down and they they are safe btc or funds this is BULLSHIT with how much i have invested I DO NOT LIKE ANYONE keeping me from my investment. so for this day forward I look to start dealing with people direct and use like clearcoin for the transfer of coins that also cuts out the % mtgox takes. I am freaking pissed I cant trust they took enough security measures to protect us in the first freaking place then they should not have opened their online service.

I dont have to worry about banks not letting me have access to my accounts or funds do to a issue they could not have for-sen so for mtgox.com to pull that shit is a power play with OUR money. Im looking into attornys tomorrow to find out their responsibly
and loss of revenues.

this my opinion and the facts.
Tomorrow is a day of reckoning .

It sounds like you failed to perform due diligence as an investor before sending your money off to a hobbyist-run Japanese web site with no real customer support or institutional accountability.

And now that the counterparty risks that you so blithely ignored have raised their ugly heads, you're throwing a tantrum.

Please, tell us all on Monday how long your attorney laughs at you and your Herpy Derpy "day of reckoning."
jr. member
Activity: 42
Merit: 1
June 19, 2011, 05:42:03 PM
#49
they wont let me sign in. Ideas?

Their main site is down. The only thing up is the support site, where your main credentials don't work.
full member
Activity: 142
Merit: 100
BTC- Its not a bubble.
June 19, 2011, 05:39:59 PM
#48
they wont let me sign in. Ideas?
Pages:
Jump to: