Pages:
Author

Topic: PRIMEDICE COMPROMISED [RESOLVED] - page 2. (Read 4226 times)

sr. member
Activity: 528
Merit: 368
January 04, 2017, 04:17:50 PM
He forced me to share the password on this thread.

BTW what was your username and password (after you changed it)? (…)
(…) If you want a full refund feel free to post it here (after changing it on primedice) and close this discussion. I also have strong doubts you only used it on primedice which is why I imagine you are hesitant. 

(emphasis mine in both quotes)
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 04:05:47 PM
Thanks to you Stunna, My account is now stolen. I'm not sure how to feel about it.  Undecided

How did that happen?

He forced me to share the password on this thread.
sr. member
Activity: 528
Merit: 368
January 04, 2017, 04:03:59 PM
Thanks to you Stunna, My account is now stolen. I'm not sure how to feel about it.  Undecided

How did that happen?
member
Activity: 117
Merit: 10
January 04, 2017, 03:57:48 PM
For some reason I'm not surprised.
legendary
Activity: 1036
Merit: 1000
January 04, 2017, 03:14:54 PM
Just someone complaining their account was compromised and funds stolen
member
Activity: 117
Merit: 10
January 04, 2017, 02:57:41 PM
What's going on here?
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 02:29:23 PM
Thanks to you Stunna, My account is now stolen. I'm not sure how to feel about it.  Undecided
legendary
Activity: 1036
Merit: 1000
January 04, 2017, 02:19:49 PM
Put simply: the lack of  pattern monitoring on Primedice servers was this the main reason this attack took place.All servers I have were money or crypto are involved have pattern monitoring installed this would have triggered a lock down on the account
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 02:11:29 PM
close the thread ? how ? No investigation, no refund. I was forced to enter my password here to prove a point and now he disappears!!

Well... What do you expect? You didn't use 2FA even if it was available so...
I didn't know they put this feature online. But if you didn't use all security tools at your disposal you can't really blame the site for it.

what percentage of people use 2FA ? all the others who don't use 2FA are insecure too ? The site should enforce 2FA too in that case. What do they do instead ? They let people make deposits even without having a password. Agreed that you want a zero-friction onboarding of users but you have to be highly secure to have something like that. The whole point of having a password less/email less sign up is to decrease overhead. How do they expect users to signup for 2FA when they don't even expect them to set a password ?

Dude it's not that...

It's just that you can't blame them for getting your coins stolen if you haven't used all the security sets they provide!
How could they enforce 2FA use? I mean that wouldn't be logical! They're not babysitters here to protect you, they give you a way to gamble and they gove you a way to do it in a safe environment. If you're too lazy to use the security tools they provide... Well you can't really argue with them afterwards. What's your argument? "You should have obliged me to be less lazy and secure my account!"?

No offense but I'm having difficulty in understanding your arguments. Instead of providing 2FA, why didn't they secure themselves from bruteforce ? Isn't that the right way to go about it when you know more than 90% of your users are not going to use 2FA anyways. You yourself lost some coins there, I'm not sure why you are taking their side though. It kind of beats the whole point of getting them to fix their security.
legendary
Activity: 1344
Merit: 1251
January 04, 2017, 02:06:10 PM
close the thread ? how ? No investigation, no refund. I was forced to enter my password here to prove a point and now he disappears!!

Well... What do you expect? You didn't use 2FA even if it was available so...
I didn't know they put this feature online. But if you didn't use all security tools at your disposal you can't really blame the site for it.

what percentage of people use 2FA ? all the others who don't use 2FA are insecure too ? The site should enforce 2FA too in that case. What do they do instead ? They let people make deposits even without having a password. Agreed that you want a zero-friction onboarding of users but you have to be highly secure to have something like that. The whole point of having a password less/email less sign up is to decrease overhead. How do they expect users to signup for 2FA when they don't even expect them to set a password ?

Dude it's not that...

It's just that you can't blame them for getting your coins stolen if you haven't used all the security sets they provide!
How could they enforce 2FA use? I mean that wouldn't be logical! They're not babysitters here to protect you, they give you a way to gamble and they gove you a way to do it in a safe environment. If you're too lazy to use the security tools they provide... Well you can't really argue with them afterwards. What's your argument? "You should have obliged me to be less lazy and secure my account!"?
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 01:56:19 PM
close the thread ? how ? No investigation, no refund. I was forced to enter my password here to prove a point and now he disappears!!

Well... What do you expect? You didn't use 2FA even if it was available so...
I didn't know they put this feature online. But if you didn't use all security tools at your disposal you can't really blame the site for it.

what percentage of people use 2FA ? all the others who don't use 2FA are insecure too ? The site should enforce 2FA too in that case. What do they do instead ? They let people make deposits even without having a password. Agreed that you want a zero-friction onboarding of users but you have to be highly secure to have something like that. The whole point of having a password less/email less sign up is to decrease overhead. How do they expect users to signup for 2FA when they don't even expect them to set a password ?
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 01:55:09 PM
I own the site gamblercity.bid I may blog the rights and wrongs this weekend.Or other people can on the site

I'm considering couple of other sites but I'd love to do that there too.
legendary
Activity: 1344
Merit: 1251
January 04, 2017, 01:43:27 PM
close the thread ? how ? No investigation, no refund. I was forced to enter my password here to prove a point and now he disappears!!

Well... What do you expect? You didn't use 2FA even if it was available so...
I didn't know they put this feature online. But if you didn't use all security tools at your disposal you can't really blame the site for it.
legendary
Activity: 1036
Merit: 1000
January 04, 2017, 01:40:42 PM
I own the site gamblercity.bid I may blog the rights and wrongs this weekend.Or other people can on the site
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 01:29:35 PM
close the thread ? how ? No investigation, no refund. I was forced to enter my password here to prove a point and now he disappears!!
legendary
Activity: 1463
Merit: 1886
January 04, 2017, 01:20:36 PM
It might be a good time to close the thread. There doesn't seem to be a single person who used good security practices who has had any problem. Hopefully though it is a useful lesson for everyone to always use a password manager, both for PrimeDice and every other site. I do not believe there are many people on earth who are capable of reliably remembering unique secure passwords for dozens of different websites.

Something like lastpass is free and works in pretty much every platform. There's really no excuse to not use something like it. Obviously sites like PrimeDice will try do their best to protect users even if their password is weak/compromised, but people need to take responsibility to have a secure password and play from a malware-free device (even with 2FA, a compromised device can still screw you)

It's a pain in the ass setting up a password manager, but it really is time well spent. Like for instance, like a month ago 340M accounts details from AdultFriendFinder seem to have been leaked. It was really nice to not have to worry about about the security of any of my other accounts.


Atleast that's a good feature that you have, setting the password for user. Hope you'd take the blame when a user's account gets hacked on your website considering you have set the password for them.

Well it's still users responsibility to keep their password safe. If you share it with someone (intentionally or accidentally) then it's your own problem. But if a password was brute forced (which has never even closed to have happened, I would know as all attempts are logged and monitored) then I would happily refund any loses.


Wasn't there a bug where you were able to modify the value of the password field and choose your own password? It happened a while ago so I assumed it's patched now but eh

Actually it's intentional. The secure password is generated client-side, which allows users to manipulate it (if they're technical and have a good reason to do so). However, even so
I still verify it zxcvbn to make sure it's reasonably secure.
newbie
Activity: 7
Merit: 0
January 04, 2017, 01:06:27 PM



Out of interest, for a couple of days I logged peoples username/password and tried to look them or crack them myself. I think my success rate was about 20-30%.


and this coming from the owner of bustabit! WOW!! speechless! can anybody feel more naked around these websites ?

Just to be very clear, I was only trying to crack their bustabit password (based on information I could find online), I obviously wasn't attempting to crack their other accounts based on the password used at bustabit.  And that risk is now 0, because bustabit doesn't even let users pick their own password.

Wasn't there a bug where you were able to modify the value of the password field and choose your own password? It happened a while ago so I assumed it's patched now but eh

And @op I wouldn't be worried if Ryan knew my bank accounts details lol. It'd probably trust him more than it's trust me

You never know. Ryan's getting robbed by Dudax these days. He might have other ideas with your bank account details. lol.

Truth be told I don't even have a bank account :*

if I could take back the day I deposited I sure as hell wish I bloody could. Can't believe that people like HufflePuff cheat the system and make millions innocently while people like us lose barely a fraction of how much he stole and we get told to suck it up. But I guess it sucks for Stunna as well :/

Stunna will you be on in 8 hours? I'd really like to converse with you about this more deeply.
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 01:04:15 PM



Out of interest, for a couple of days I logged peoples username/password and tried to look them or crack them myself. I think my success rate was about 20-30%.


and this coming from the owner of bustabit! WOW!! speechless! can anybody feel more naked around these websites ?

Just to be very clear, I was only trying to crack their bustabit password (based on information I could find online), I obviously wasn't attempting to crack their other accounts based on the password used at bustabit.  And that risk is now 0, because bustabit doesn't even let users pick their own password.

Wasn't there a bug where you were able to modify the value of the password field and choose your own password? It happened a while ago so I assumed it's patched now but eh

And @op I wouldn't be worried if Ryan knew my bank accounts details lol. It'd probably trust him more than it's trust me

You never know. Ryan's getting robbed by Dudax these days. He might have other ideas with your bank account details. lol.
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 01:02:02 PM



Out of interest, for a couple of days I logged peoples username/password and tried to look them or crack them myself. I think my success rate was about 20-30%.


and this coming from the owner of bustabit! WOW!! speechless! can anybody feel more naked around these websites ?

Just to be very clear, I was only trying to crack their bustabit password (based on information I could find online), I obviously wasn't attempting to crack their other accounts based on the password used at bustabit.  And that risk is now 0, because bustabit doesn't even let users pick their own password.

what do you mean by logging their usernames/passwords then ? Atleast that's a good feature that you have, setting the password for user. Hope you'd take the blame when a user's account gets hacked on your website considering you have set the password for them.
member
Activity: 84
Merit: 10
Javascript developer, Available for work
January 04, 2017, 12:58:55 PM
Ryan, seriously ? you are asking me to share my password here ?

I mean, is the question really about how strong my password is ? Shouldn't the question be, why did they let me choose a weak password if at all I chose a weak password ?

Sure, why not? My password was yMrND9DpHD9T   (but I just changed it). Your account has already been hacked, so it presumedly doesn't even have money in it. I don't see the harm in sharing a password as unique and strong as you claim  Grin

I can tell you that my password is stronger than yours with more than alphanumeric.


That's simply untrue, I can google the password you supplied me and get plenty of results of it being used as a mysql password. Note when you google "yMrND9DpHD9T" you get no results. If you want a full refund feel free to post it here (after changing it on primedice) and close this discussion. I also have strong doubts you only used it on primedice which is why I imagine you are hesitant.  

You took 4 days to respond to me and now you say that I'm wasting your time. I never wanted to sound harsh but you called me a liar and make me sound like a beggar. It's upto users of this forum to judge you I suppose.

My password was pP@$$w0rd and it's definitely unique to this site. you tell me that this a password that could be guessed by a random guy in less than 10 minutes, I have nothing to say to you. and guys, do google it and tell me if you find it.

I was able to find pp@$$w0rd in plaintext and MD5 in a leaked password list.

People use rules that change letters from lowercase to uppercase using Hashcat meaning that the password isn't exactly 100% unique but yeah the chance of someone guessing it... or brute forcing it.... hell nah

Fair, the username of his account is widely used on a bunch of other bitcoin websites though. And regarding Robert, that really is terrible but there were no back-end flaws that resulted in that.

yes, so you please try and login to one of those websites with same password and you tell me if you can crack any of them please.

So you are alleging that there is some superbug that will let anyone compromise accounts? I don't know what you're trying to accomplish here. There are other ways you could have been compromised as well such as phishing/scripts/bots.

I asked you to investigate this issue for me. To try to find out how I got robbed. It's you who took me in the direction of 'weak password, not unique password, anybody can guess it'. Now that you know that's not true, this is another direction - phishing, scripts, bot.

You tell me, did I use scripts ? you'd be able to differentiate between manual betting and a script betting on your website I suppose ? no ?
Phishing ? have you been following my concerns ? the account got hacked in less than 10 minutes.

This story would make for one heck of a blog post I believe.
Pages:
Jump to: