Pages:
Author

Topic: MtGox2014Leak.zip - page 2. (Read 8389 times)

legendary
Activity: 860
Merit: 1026
March 10, 2014, 12:27:04 PM
#33
Assuming you can be 100% sure that the software you are using to open these files (or to unzip them) is absolutely secure and there are no exploits for them known to mankind. Which you can't.

Yes Yes like zlib has a exploit that only these fancypants hackers know about. Sure. That's so likely.

Feel free to show us where in the zlib source code this exploit you imagine exists. I'm sure a zillion people would like to know.
Ever heard of 0-day exploits? I don't have to prove anything here. All I'm saying is, that there is a risk you should not be willing to take if you don't know exactly what you are doing.
Files handed to you by cybercriminals can not be trusted.
full member
Activity: 142
Merit: 100
March 10, 2014, 12:21:57 PM
#32
I can concur that 'mtgox_balances' is accurate and well up to date. I was able to verify myself with the correct balance.


legendary
Activity: 3066
Merit: 1147
The revolution will be monetized!
March 10, 2014, 12:09:49 PM
#31
You're not "fuckin crazy" just because you are smart enough to understand how to look at text files. My personal opinion is that you are extremely stupid if you seriously believe that unzipping a file and looking at plain text files will harm you in any way.
Assuming you can be 100% sure that the software you are using to open these files (or to unzip them) is absolutely secure and there are no exploits for them known to mankind. Which you can't.
+1 Why would I even bother to take the risk? To see a supposed secret leaked document?  I know what the risks are, I've been on the internet and into computing for over 20 years now. I also worked on a farm and learned the smell of bullshit IRL. 
legendary
Activity: 860
Merit: 1026
March 10, 2014, 11:33:53 AM
#30
You're not "fuckin crazy" just because you are smart enough to understand how to look at text files. My personal opinion is that you are extremely stupid if you seriously believe that unzipping a file and looking at plain text files will harm you in any way.
Assuming you can be 100% sure that the software you are using to open these files (or to unzip them) is absolutely secure and there are no exploits for them known to mankind. Which you can't.
legendary
Activity: 3178
Merit: 1348
March 10, 2014, 11:08:35 AM
#29
Guys, word of advice, do NOT open any links or files that you aren't entirely aware of.
They may compromise your wallets or install a key logger on your PC recording your passwords.
Be careful!
legendary
Activity: 3066
Merit: 1147
The revolution will be monetized!
March 10, 2014, 10:01:41 AM
#28
Anyone who downloads this is fuckin crazy. What a crock of crap. I love how it is labeled "leak".  Roll Eyes
Is that supposed to remind Mark that he leaked it to himself?
legendary
Activity: 3472
Merit: 1722
March 10, 2014, 10:00:17 AM
#27
Mod note: be careful with the executable, run it only on an isolated virtual machine

Don't even run untrusted executables in a virtual machine! There have been several ways of breaking out of one, and there certainly will be more!

Why in the name of Satoshi would you run it at all?

You decompile untrusted executables, you don't run them.

Apparently the wallet stealer was some sort of super simple interpreted code this time and would only look for wallet.dat and upload it to the thieves this time, but next time it could very be much more advanced malware. Do not take stupid risks.

That's why I wrote "isolated" (no shared folders, preferably on a separate physical machine, guest additions disabled, etc.).
full member
Activity: 309
Merit: 100
March 10, 2014, 09:56:18 AM
#26
But I don't think your truly explaining the reason to use checksums: A trusted person releases a file to the wild, and states this is my files checksum. The problem here is the person who created this file is not trusted.

Just want to make that clear for people that are not engineers or coders or tech savvy to understand when to be using a checksum.


Since this file was released by an untrusted source checksums become useless and could give someone false hope.


Kosta


Not sure how a checksum helps here ... Checksums ONLY work when you trust the party that constructed the file + checksum. Did someone trusted create the file + checksum linked above?

Kosta

A file which does not checksum will have different contents (or be corrupt) which is a give away that someone has monkeyed with it.  Almost certainly such a thing would indicate the inclusion of contents with exploits.

When I wrote that, it was unknown whether the 'original' contained exploits or not.  Reports now seem to indicate that it is full of them.  (Who could have seen that coming?)

Checksums are basic and simple things that have been in use for decades.  For good reason.  Using checksums in a situation like this one can help identify a very likely class of theft attempts.  There is no reason but utter ignorance and laziness not to use them...except to attempt to perpetrate a theft that is.


legendary
Activity: 1400
Merit: 1013
March 10, 2014, 08:26:43 AM
#25
Let us not forget that even inside a VM any  virus/exploit is already BEHIND your main defense and can easily access the ip addresses of any computers on your internal network(not to mention default passwords/access on your router!!)
Including the machine the VM is being hosted on…(not much point in having a DMZ, if you are going to put shit inside it…)
and that is before we even consider the capability to  crash 'out' of a VM.
You're assuming the most simplistic possible implementation of virtualized networking.

Also, using off the shelf routers is a really bad idea. All that shit's rooted.
sr. member
Activity: 399
Merit: 250
March 10, 2014, 08:21:28 AM
#24
Yep…….
Let us not forget that even inside a VM any  virus/exploit is already BEHIND your main defense and can easily access the ip addresses of any computers on your internal network(not to mention default passwords/access on your router!!)
Including the machine the VM is being hosted on…(not much point in having a DMZ, if you are going to put shit inside it…)
and that is before we even consider the capability to  crash 'out' of a VM.

This is the result of teaching liberal arts at school…. many people seem incapable of thinking more than one move ahead.
sr. member
Activity: 441
Merit: 250
March 10, 2014, 06:48:35 AM
#23
Mod note: be careful with the executable, run it only on an isolated virtual machine

Don't even run untrusted executables in a virtual machine! There have been several ways of breaking out of one, and there certainly will be more!

Why in the name of Satoshi would you run it at all?

You decompile untrusted executables, you don't run them.

Apparently the wallet stealer was some sort of super simple interpreted code this time and would only look for wallet.dat and upload it to the thieves this time, but next time it could very be much more advanced malware. Do not take stupid risks.
sr. member
Activity: 364
Merit: 250
American1973
March 10, 2014, 03:03:44 AM
#21

[..]

The thought of Mt. Gox not using a revision control system is so absurd that I find it hard to believe.  I'm inclined to think that this is another bullshit story and feeble attempt to make people believe that they are more incompetent than they actually are.

So true that it pays to play dumb.  And interesting gambit to release crapcode as smokescreen to cover cointheft.  Much to ponder, thanks a lot because also, most programs suck ass and are swiss cheese.  Your efforts to help are appreciated.
legendary
Activity: 4690
Merit: 1276
March 10, 2014, 02:57:20 AM
#20

This is fucking nuts! First, I had to get up to speed as to what the hell a motiff[sic] is in BFL's thread back in the day, now I need to learn what the heck a checksum is, then learn how to use it.

To show you what type of noob I am, although I know quite a bit about HTML and CSS, for the life of me I couldn't tell you what those acronyms stand for sans looking them up first. I know just enough about PHP as it applies to Wordpress that caused me all kinds of problems till I finally learnt to do backups of any codes I'm altering.

Knowing how to use a simple md5 or sha256 checksum should be pretty much mandatory for anyone messing around with Bitcoin in my opinion.  What a checksum is is pretty easy to understand and it should be pretty simple to use them on all platforms.

Anyone doing any coding really owes it to themselves to use a revision control system of some sort.  Keeping a local subversion repository one one's hard drive is a really a relatively simply operation and a getting the hang of a few command line options is all one really needs to do in order to use it effectively.  The comfort of knowing that you can easily snapshot anything and see changes expedites development.  I probably would not have gotten around to learning how nice this is if it were not a factor for my professional work, but I'd have been much the worse for it.

I find SVN to be really useful for remote admin/dev and deployment as well in conjunction with gmake, but that's beyond the scope of what most people need.

For routine system admin tasks I habitually use RCS which is built into most of the systems I use.  This lets me quickly see all of the stuff I've done on my system (and what I might be forgetting when I build another system and so on.)  RCS has some gotchas though.

The thought of Mt. Gox not using a revision control system is so absurd that I find it hard to believe.  I'm inclined to think that this is another bullshit story and feeble attempt to make people believe that they are more incompetent than they actually are.

legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
March 10, 2014, 02:37:04 AM
#19

OP: You should put a checksum with a file like this.  It would be an obvious ploy to replace some of the files with trojans.  If the original is though to be clean, people may execute exploits contained in a zip they thought to be real.

I downloaded a copy from:

  [http]://blog.magicaltux.net/wp-content/uploads/2014/03/MtGox2014Leak.zip

at in the morning PST (2014.03.09) and this is the checksum I get:

  snip@snip ~> sha256 MtGox2014Leak.zip
  SHA256 (MtGox2014Leak.zip) = ffcf6742ab84d7e29ef16ca4f0829d7c4e7a4f739414d2b6d2ded52f05e75a67

Several people on a different thread get the same checksum, but I don't know if they got it from the same place or not.

Checksums are easy to check, reliable, and quite critical for data such as this.  I would be very wary of anything sensitive that I downloaded which did not come with a checksum, and I would (and do) cross-check these.

If anyone finds a file of the same name with a different checksum it would be good to report it (even worth starting a new thread) and handing it over to people who can analyze the contents.  We really don't need any more people losing money to stupid things associated with Mt. Gox...though I suspect we'll see a lot more in the weeks to come Sad



This is fucking nuts! First, I had to get up to speed as to what the hell a motiff[sic] is in BFL's thread back in the day, now I need to learn what the heck a checksum is, then learn how to use it.

To show you what type of noob I am, although I know quite a bit about HTML and CSS, for the life of me I couldn't tell you what those acronyms stand for sans looking them up first. I know just enough about PHP as it applies to Wordpress that caused me all kinds of problems till I finally learnt to do backups of any codes I'm altering.
sr. member
Activity: 364
Merit: 250
American1973
March 10, 2014, 02:23:43 AM
#18
It is well known by those who know things, that PDF are absolute crapware destruction vector.  See the Aurora hacks of three years ago.

This whole exploit is another sad reality: Abused little shitbags grow up into thieving adult high-tech shitbags.
legendary
Activity: 4690
Merit: 1276
March 10, 2014, 01:23:28 AM
#17
Not sure how a checksum helps here ... Checksums ONLY work when you trust the party that constructed the file + checksum. Did someone trusted create the file + checksum linked above?

Kosta

A file which does not checksum will have different contents (or be corrupt) which is a give away that someone has monkeyed with it.  Almost certainly such a thing would indicate the inclusion of contents with exploits.

When I wrote that, it was unknown whether the 'original' contained exploits or not.  Reports now seem to indicate that it is full of them.  (Who could have seen that coming?)

Checksums are basic and simple things that have been in use for decades.  For good reason.  Using checksums in a situation like this one can help identify a very likely class of theft attempts.  There is no reason but utter ignorance and laziness not to use them...except to attempt to perpetrate a theft that is.



But we would need a checksum from the 'hacker' in order to ensure integrity.

Huh?  No, the goal is simply to see if different zip archives are being passed around, and potentially leveraging some level of confidence that might have been associated with the 'original'.  It dawned on my right away that a good way for a thief to distribute trojans would be to  replace some of the dangerous files (specifically .exe and .pdf files) with one's own variant of them.  This whether the 'original' was trojan free or not.

We are not measuring absolute values here but rather looking for differential information.  The latter can be as valuable as the former in many cases.  Even more so since the 'original' would not have provided any information about safety anyway.

hero member
Activity: 882
Merit: 501
Ching-Chang;Ding-Dong
March 10, 2014, 01:06:59 AM
#16
Not sure how a checksum helps here ... Checksums ONLY work when you trust the party that constructed the file + checksum. Did someone trusted create the file + checksum linked above?

Kosta

A file which does not checksum will have different contents (or be corrupt) which is a give away that someone has monkeyed with it.  Almost certainly such a thing would indicate the inclusion of contents with exploits.

When I wrote that, it was unknown whether the 'original' contained exploits or not.  Reports now seem to indicate that it is full of them.  (Who could have seen that coming?)

Checksums are basic and simple things that have been in use for decades.  For good reason.  Using checksums in a situation like this one can help identify a very likely class of theft attempts.  There is no reason but utter ignorance and laziness not to use them...except to attempt to perpetrate a theft that is.



But we would need a checksum from the 'hacker' in order to ensure integrity.
legendary
Activity: 4690
Merit: 1276
March 10, 2014, 01:00:30 AM
#15
Not sure how a checksum helps here ... Checksums ONLY work when you trust the party that constructed the file + checksum. Did someone trusted create the file + checksum linked above?

Kosta

A file which does not checksum will have different contents (or be corrupt) which is a give away that someone has monkeyed with it.  Almost certainly such a thing would indicate the inclusion of contents with exploits.

When I wrote that, it was unknown whether the 'original' contained exploits or not.  Reports now seem to indicate that it is full of them.  (Who could have seen that coming?)

Checksums are basic and simple things that have been in use for decades.  For good reason.  Using checksums in a situation like this one can help identify a very likely class of theft attempts.  There is no reason but utter ignorance and laziness not to use them...except to attempt to perpetrate a theft that is.

sr. member
Activity: 294
Merit: 250
March 10, 2014, 12:59:58 AM
#14
How many new members posting this url in the last 24 hours ?

Pages:
Jump to: