Author

Topic: NXT :: descendant of Bitcoin - Updated Information - page 1545. (Read 2761645 times)

hero member
Activity: 808
Merit: 1011
Does anyone have any suggestions on the best tools to find and remove spyware, keyloggers and all others of similar nature?

No. Format your hard disks. If a machine was compromised there is no other way.
hero member
Activity: 808
Merit: 1011
@TwinWinNerD: You could have a hidden blabla.xxx file which is actually a .txt file and everytime you need the master key, you change the filename to .txt, open it, copy/paste the password. That a bit safer.
full member
Activity: 140
Merit: 100
Does anyone have any suggestions on the best tools to find and remove spyware, keyloggers and all others of similar nature?
hero member
Activity: 742
Merit: 500
Apart from this jump today because of Bter.com, the price is depressingly not going anywhere - actually moving down.

You would think that NXT would gain a momentum by now, that it be proven that it's not a scam and that that would reflect in price, but no - it's not doing anything.

There should be more hype, more demand...

Tell me honestly you don't fell the same way? (put aside todays move)

i cannot remember 24h having a volume of 680btc only on dgex - even in the days before fees and massive abuse of insider traiding it was around 500 btc. The only reason for not skyrocketing today is that this time the supply of nxt was much higher
legendary
Activity: 1680
Merit: 1001
CEO Bitpanda.com
If this story is true, someone has to be remotely on your PC to get the passes out of KeePass. That's not possible through console. How do you type in the master password of Keepass? If you type it manually, Keylooger will be back on topic. If someone got your master password, he only has to download your .kdb-file and you're completely fucked.

I type it in manually, is there another way? If it is true that my .kdb file is compromissed, i need to change about 150 passwords and lock some online banking accounts.

Fuck my life seriously. I am off now, need to fix this mess.
legendary
Activity: 1120
Merit: 1000
Apart from this jump today because of Bter.com, the price is depressingly not going anywhere - actually moving down.

You would think that NXT would gain a momentum by now, that it be proven that it's not a scam and that that would reflect in price, but no - it's not doing anything.

There should be more hype, more demand...

Tell me honestly you don't fell the same way? (put aside todays move)

More than 50% increase since yesterday? I don't see your point...
Wait a couple of days and see how it works out.

What you just said was actually not a part of my point. But go read it again.
legendary
Activity: 1680
Merit: 1001
CEO Bitpanda.com
TwinWinNerD:
check browser history - where did you download NRS?
check download history - where did you download it exactly? really no nxtcripto.org..?
check hash of downloaded client

I use firefox and when i rightclick on the download and choose: Go to download page, it takes me straight to: http://www.nxtcrypto.org/nxt-coin/client-download

Now i really think i got myself a keylogger/virus.

Fuck.
full member
Activity: 196
Merit: 100
Apart from this jump today because of Bter.com, the price is depressingly not going anywhere - actually moving down.

You would think that NXT would gain a momentum by now, that it be proven that it's not a scam and that that would reflect in price, but no - it's not doing anything.

There should be more hype, more demand...

Tell me honestly you don't fell the same way? (put aside todays move)

More than 50% increase since yesterday? I don't see your point...
Wait a couple of days and see how it works out.

edit:
Asking "Why am I not rich yet" After a max of two month seems kinda cute Cheesy
hero member
Activity: 808
Merit: 1011
If this story is true, someone has to be remotely on your PC to get the passes out of KeePass. That's not possible through console. How do you type in the master password of Keepass? If you type it manually, a Keylogger might be the problem. If someone got your master password, he only has to download your .kdb-file and you're completely fucked.
hero member
Activity: 490
Merit: 504
TwinWinNerD:
check browser history - where did you download NRS?
check download history - where did you download it exactly? really no nxtcripto.org..?
check hash of downloaded client
legendary
Activity: 1680
Merit: 1001
CEO Bitpanda.com
Errr...the hex string in question is just a big number in decimal: 3.39197779385E+27 is what it converts back to.
Might be possible that someone is running a bruteforce attack on all the numbers, but seeing that 3 accounts on the same PC were compromised at the same time, malware/trojan is a much more likely explanation.

Getting a feeling of deja-vu here, feels like the EpicThomas story again


I downloaded this software today, and the download matches the hash shown on the site.
http://www.nxtcrypto.org/nxt-coin/client-download

If so, this indicates that your client was not the problem.

Either your OS is infected or somebody somehow got access to your passwords. How did/do you store the passwords?

Passwords are stored in a Keepass 2 database that is locked by a masterpassword that is >50 digits long. I have 2 USB backups of that file and one that sits on my computer.
legendary
Activity: 1120
Merit: 1000
Apart from this jump today because of Bter.com, the price is depressingly not going anywhere - actually moving down.

You would think that NXT would gain a momentum by now, that it be proven that it's not a scam and that that would reflect in price, but no - it's not doing anything.

There should be more hype, more demand...

Tell me honestly you don't fell the same way? (put aside todays move)
full member
Activity: 196
Merit: 100
Errr...the hex string in question is just a big number in decimal: 3.39197779385E+27 is what it converts back to.
Might be possible that someone is running a bruteforce attack on all the numbers, but seeing that 3 accounts on the same PC were compromised at the same time, malware/trojan is a much more likely explanation.

Getting a feeling of deja-vu here, feels like the EpicThomas story again

Are there any trojans out there with the ability to read copy/pasted text ? Not very up to date with the magical world of malware.


You made a mistake somewhere.
Converting Hex to Dec will make the string even longer. Something over E+70. It should be safe with this length.
hero member
Activity: 798
Merit: 500
Errr...the hex string in question is just a big number in decimal: 3.39197779385E+27 is what it converts back to.
Might be possible that someone is running a bruteforce attack on all the numbers, but seeing that 3 accounts on the same PC were compromised at the same time, malware/trojan is a much more likely explanation.

Getting a feeling of deja-vu here, feels like the EpicThomas story again


I downloaded this software today, and the download matches the hash shown on the site.
http://www.nxtcrypto.org/nxt-coin/client-download

If so, this indicates that your client was not the problem.

Either your OS is infected or somebody somehow got access to your passwords. How did/do you store the passwords?
legendary
Activity: 1680
Merit: 1001
CEO Bitpanda.com
Errr...the hex string in question is just a big number in decimal: 3.39197779385E+27 is what it converts back to.
Might be possible that someone is running a bruteforce attack on all the numbers, but seeing that 3 accounts on the same PC were compromised at the same time, malware/trojan is a much more likely explanation.

Getting a feeling of deja-vu here, feels like the EpicThomas story again


I downloaded this software today, and the download matches the hash shown on the site.
http://www.nxtcrypto.org/nxt-coin/client-download
legendary
Activity: 1176
Merit: 1134

There is no way this can be right. If that was a true random hex number with that many digits there is no way it could be cracked easily. Can someone else input on this?

The second and third accounts had no 256-bit public key (no transactions out) so someone possibly could have accessed them via a collision. As someone else mentioned though as all three accounts were accessed (basically at the same time) it may be more likely he has malware on his machine.

Does the destination acct have a public key yet?

Nope.

So it fits the pattern of the prior hack. The unsolved one before the tainted download. NXT ends up in darkNXT acct and sits there.

James
hero member
Activity: 854
Merit: 1001
Errr...the hex string in question is just a big number in decimal: 3.39197779385E+27 is what it converts back to.
Might be possible that someone is running a bruteforce attack on all the numbers, but seeing that 3 accounts on the same PC were compromised at the same time, malware/trojan is a much more likely explanation.

Getting a feeling of deja-vu here, feels like the EpicThomas story again

Are there any trojans out there with the ability to read copy/pasted text ? Not very up to date with the magical world of malware.
full member
Activity: 224
Merit: 100

There is no way this can be right. If that was a true random hex number with that many digits there is no way it could be cracked easily. Can someone else input on this?

The second and third accounts had no 256-bit public key (no transactions out) so someone possibly could have accessed them via a collision. As someone else mentioned though as all three accounts were accessed (basically at the same time) it may be more likely he has malware on his machine.

Does the destination acct have a public key yet?

Nope.
legendary
Activity: 1176
Merit: 1134

There is no way this can be right. If that was a true random hex number with that many digits there is no way it could be cracked easily. Can someone else input on this?

The second and third accounts had no 256-bit public key (no transactions out) so someone possibly could have accessed them via a collision. As someone else mentioned though as all three accounts were accessed (basically at the same time) it may be more likely he has malware on his machine.

Does the destination acct have a public key yet?
legendary
Activity: 1680
Merit: 1001
CEO Bitpanda.com
Omg, someone cleared 3 of my accounts....

I used 256bit keys generated by Keepass 2. I am using  NRS 0.5.8 that installed today and downloaded from nxtcrypto.org. I am using Windows 7 Professional and am running Avira and Microsoft Security Essentials.

The NXT was transferred about half an hour ago, also while i was forging.

My PC was running unlocked but i can be 99.99% sure that no one had access to it physically. So I don't really know how this happend?!? It can't be bruteforce right?
My accounts:
8423671173148912884   107,217
12345678612257264594   71
13486646175575465553   998
The NXT are now in this account:
696356957947686421 Balance Total    :   108,286 NXT

Fuck me...

Btw the password of the third account was for example: af5c73ca7cf5f25ffa3b6b1689f40aaf60fd040b0de298c1ca661f8602d38311

Any chance of seeing these NXT again? Sad

had you used online wallet? or local client?

always local client.

@anon why do you say windows is the problem? I used it for >2 years and never had any problems ect.

Also i never type the keys always copypaste them, so would a keylogger really get these passwords?

Damn.... I guess i have to format my PC and setup a new OS. Atleast my BTC are in cold storage and still safe.
Jump to: