Pages:
Author

Topic: Reports of MtGox being hacked ARE REAL (Fixed) - page 3. (Read 41607 times)

full member
Activity: 196
Merit: 101
Man, I saw this shit coming after the crash earlier this week. Then poor Allinvains Hacks...:[
No worries all protected her, Still lovin Them BTC.

I think it's a guy, just with a girly name.
newbie
Activity: 28
Merit: 0
Man, I saw this shit coming after the crash earlier this week. Then poor Allinvains Hacks...:[
No worries all protected her, Still lovin Them BTC.
legendary
Activity: 2156
Merit: 1072
Crypto is the separation of Power and State.
Is anyone having a problem logging in now? What I mean is, I can log in, then see the trade screen and my balance is shown in the upper right, but when I go to another page, such as account settings, it says I'm not logged in, and asks for me to log in again.

Yep, same here.

I demand that strong feelings be expressed, and highly recommend a general panic.  Mass hysteria is our only option!
full member
Activity: 140
Merit: 100
Is anyone having a problem logging in now? What I mean is, I can log in, then see the trade screen and my balance is shown in the upper right, but when I go to another page, such as account settings, it says I'm not logged in, and asks for me to log in again.

EDIT: It's fixed by MagicalTux. Sounds like it was just a website bug, not a security thing.
member
Activity: 112
Merit: 10
in my understanding any web site is vulnerable to such attack? is this correct?

Not correctly-designed ones.

(I don't blame MagicalTux, since he didn't write the code.)

Could you or anyone please point me where one can read how it can be dealt with on a server side?


That info is on the wiki page for CSRF. Basically the server side needs to put a unique token on each page and check for the presence of it on postback. Also doing an HTTP Referrer check helps a lot. There are other things as well but those are the main two.
member
Activity: 112
Merit: 10
The noscript add-on says it has "limited" CSRF protection. I'm not sure what that means.
member
Activity: 112
Merit: 10
Is there a firefox plugin that will
So they are taking my cookies? NOZ! Angry

Basically, when you visit their site they secretly load an iframe that contains mtgox.com. The URL of the iframe points to an XSS hole, which injects Javascript to send document.cookie (which stores your session info) to a site they own. They can then put the cookie data into their browser, and assume your session and log into mtgox.

I don't know this specific exploit but that is how it generally works.

Nope.avi.
CSRF != XSS.

XSS = put my javascript on your site

CSRF = put a form on my site that POSTs to your site, for added fun auto-submit it with JavaScript

how can this be dealt on a client side besides what's been mentioned above, is there a method to detect/disable both vulnerabilities without turning off cookies and js?
Is there a firefox plugin that will make each tab have it's own session? That would take care of the problem.
sr. member
Activity: 364
Merit: 250
Mtgox is not the only CSRF'able site.
http://forum.bitcoin.org/index.php?topic=18020.0
legendary
Activity: 1806
Merit: 1003
Not sure if this is relevant, but I've noticed that TradeHill does not automatically log you out after a period of inactivity.  I noticed that one morning when I hopped on my computer, I did not have to log in - I was still logged in from the night before.

The fact that tradehill doesn't log you out has no impact on your security, IF tradehill properly implemented security measures to prevent CSRF

member
Activity: 111
Merit: 10
Is it just me or does all this seem just a little bit sensational.
member
Activity: 64
Merit: 10
Watch how Bitcoin brings computer security to the masses. Just another undiscovered benefit.

It has certainly impacted me personally.  I have learned a lot about security in the past two weeks on this site, and I have already begun migrating from Windows to Ubuntu.
legendary
Activity: 1050
Merit: 1000
in my understanding any web site is vulnerable to such attack? is this correct?

Not correctly-designed ones.

(I don't blame MagicalTux, since he didn't write the code.)

Could you or anyone please point me where one can read how it can be dealt with on a server side?
legendary
Activity: 1050
Merit: 1000
were there any other sites that been exploited with these things in the past?

in my understanding any web site is vulnerable to such attack? is this correct?

Sorry for the OT post, but I couldn't help myself.

Watch how Bitcoin bring computer security to the masses. Just another undiscovered benefit.

+1, thought exactly the same thing.
administrator
Activity: 5222
Merit: 13032
in my understanding any web site is vulnerable to such attack? is this correct?

Not correctly-designed ones.

(I don't blame MagicalTux, since he didn't write the code.)
legendary
Activity: 1050
Merit: 1000
were there any other sites that been exploited with these things in the past?

in my understanding any web site is vulnerable to such attack? is this correct?
legendary
Activity: 1050
Merit: 1000
So they are taking my cookies? NOZ! Angry

Basically, when you visit their site they secretly load an iframe that contains mtgox.com. The URL of the iframe points to an XSS hole, which injects Javascript to send document.cookie (which stores your session info) to a site they own. They can then put the cookie data into their browser, and assume your session and log into mtgox.

I don't know this specific exploit but that is how it generally works.

Nope.avi.
CSRF != XSS.

XSS = put my javascript on your site

CSRF = put a form on my site that POSTs to your site, for added fun auto-submit it with JavaScript

how can this be dealt on a client side besides what's been mentioned above, is there a method to detect/disable both vulnerabilities without turning off cookies and js?
newbie
Activity: 56
Merit: 0
sounds like everything is safer then ever. excellent job guys.
newbie
Activity: 56
Merit: 0
Both bugs are fixed now. I have just verified it.

until 5 minutes ago, the following banner appeared on bitcoincharts.com:
newbie
Activity: 67
Merit: 0
Now that we know the attack vector, can we search for bitcoin related websites that were taking advantage of it?

Yess, you can start with the buttcoins website, it just advertised for a wallet stealing site.

walletinspector.info has once again been replaced by a static png image. They tried to re-implement it as a "funny" javascript-only form. Linode's abuse department didn't find my pointing this out humorous. The original site before ~00:00 CST did really steal wallets and the owner tried to play it off as a harmless prank to avoid service termination.

I'm still slightly disappointed that service was not outright canceled once it was discovered the authorized user of that VPS was in fact responsible for said site and that it wasn't due to a compromise.

At least it's not harmful, for now.
REF
hero member
Activity: 529
Merit: 500
and today was my first time using mtgox.... good thing i didnt want i needed to and took everything out once i finished. I even hit log out which i almost never do. Seems like some admin has removed this from the news. Good no need to cause panic over something which has been fixed.
Pages:
Jump to: