Author

Topic: (SOLVED) downloaded virus(es) by Bitcoin Core 0.9.0 (Read 6455 times)

copper member
Activity: 1498
Merit: 1528
No I dont escrow anymore.
I think maybe it's just random coincidence that the transaction signatures end up containing the same signatures that some virus detection programs use. There are gigabytes of essentially random data in the blockchain, and so there is a good chance of a random match.

Is that correct?

Yes but there have also been transactions specifically designed to trigger this. It basically was an attemt to DoS Bitcoin
read more about that here: https://bitcointalksearch.org/topic/security-dos-vulnerability-554738
newbie
Activity: 25
Merit: 0
I think maybe it's just random coincidence that the transaction signatures end up containing the same signatures that some virus detection programs use. There are gigabytes of essentially random data in the blockchain, and so there is a good chance of a random match.

Is that correct?
sr. member
Activity: 309
Merit: 250
Can you please change your topic, it's a bit inflammatory.

What you're seeing is virus false alarms because the virus detection software on your computer checks for short (e.g. 16 bytes) 'signatures' and not the viruses themselves, and people have put some of these signatures in transactions.  The AV software correctly ignores the blockchain itself but is falsely triggered in some of the leveldb database files. You should configure your AV to ignore the bitcoin directory.

There is no risk to your system here.

thanks for the information!

why is it allowed to put such f..king signatures into transactions, so into the blockchain?

average joe must fear to have multiple viruses on his system downloaded by the bitcoin-network!

could this be done with the new 0.9.0-bitcoin-core?
staff
Activity: 4242
Merit: 8672
Can you please change your topic, it's a bit inflammatory.

What you're seeing is virus false alarms because the virus detection software on your computer checks for short (e.g. 16 bytes) 'signatures' and not the viruses themselves, and people have put some of these signatures in transactions.  The AV software correctly ignores the blockchain itself but is falsely triggered in some of the leveldb database files. You should configure your AV to ignore the bitcoin directory.

There is no risk to your system here.
sr. member
Activity: 309
Merit: 250
W7-32-Ultimate
Bitcoin Core 0.9.0
avast-anti-virus-software found:

roaming-bitcoin-blocks-blk00129.dat: "Diskspoiler"

roaming-bitcoin-chainstate-064498.sst: "Oropax"
roaming-bitcoin-chainstate-064499.sst: "Diskspoiler"
roaming-bitcoin-chainstate-064549.sst: "Yankee Doodle"
roaming-bitcoin-chainstate-064574.sst: "Attention"
roaming-bitcoin-chainstate-064608.sst: "Syslock"
roaming-bitcoin-chainstate-064651.sst: "PrtScr1024"
roaming-bitcoin-chainstate-064681.sst: "Murphy"

cleaned by avast
cleaned the bitcoin-roaming-folder except the wallet-dat
copied clean-two-weeks-old-blockdata to the roaming-folder
avast-scan of the folder - clean
started bitcoin again
some synchronizing-time later
found nearly the same problems:

roaming-bitcoin-blocks-blk00129.dat: "Diskspoiler"

roaming-bitcoin-chainstate-050584.sst: "Diskspoiler"
roaming-bitcoin-chainstate-050592.sst: "Yankee Doodle"
roaming-bitcoin-chainstate-050608.sst: "PrtScr1024"
roaming-bitcoin-chainstate-050617.sst: "Raubkopie"
roaming-bitcoin-chainstate-050619.sst: "Syslock"
roaming-bitcoin-chainstate-050634.sst: "Murphy"
roaming-bitcoin-chainstate-050638.sst: "Oropax"
roaming-bitcoin-chainstate-050696.sst: "Attention"

are these virus(es) in the bitcoin-network?

is it only my problem?

Edit: another W7-64-prof-system is synchronizing with bitcoin 0.8.6-client - lets see if it gets the same problems

Jump to: