I remembered when I saw your topic
Hiring Telegram Managers and I contacted you via Telegram.
It is since late of May and you almost inactive since May. What happened recent weeks?
If you scroll back into my posts you'll see I've been increasingly inactive on Bitcointalk since late 2019.
I've been focusing my energy on my work on Telegram and Discord.
I need to change the staked address as that one is compromised during the April hack that I mentioned above.
you should definitely confirm ownership of the account by signing a message on one of your oldest addresses used here on the forum. I guess not all of them is compromised and only you have access to them.
Your oldest (used 11 April 2013)
1C5voy2et9odzmocDxirb4S6GrTJ6MeqsW here Or
3JHJKATezUpeGs9JeobzY7U2Fo6iybZ6yL which you used (in 2018) to apply in signature campaigns.
here,
here,
here I already have a strong password. Always did.
the reason is that it must be determined that you are the original owner of the account. But obviously is not enough strong.
The MeqsW wallet was from some third party exchange / platform. I don't even remember where.
I have access to the later ones as those would be from my Greenwallet wallet account. I'll have to install the desktop app and find a way to sign from there. Will do that later today or whenever I find some time.
The password itself was a strong alpha numeric 26 character pw with special characters and all..
I am suspecting the hacker got access to my Firefox sync account as well which would enable him to get passwords of different accounts. Of course I've reset that pw along with all the old important passwords. (and still resetting the unimportant ones)
Suspicion confirmed.
Is there anything in your PM or outbox? Of course that could have been deleted so you can't know for sure.
No posts were made:
loyce.club/archive/members/9/93844.html.
I just checked BPIP and indeed there was a password reset last month. I don't know how this happened.
Actually, the reset was today, a month ago it was only "changed":
8/18/2021 2:27:22 PM password changed
9/13/2021 3:53:45 PM password reset via email
I assume you're the one who reset it, but doesn't that mean the attacker must have entered your old password in order to change it?
Any chance you can sign a message from an old
staked address?
Yes I was the one who reset it and the one before was 'changed'.
Which implies the hacker must have had my BTT password from the April email breach (which would have given him access to Firefox sync where I store a bulk of my passwords) and he simply tried to log in and changed the pw last month.
There have been a number of attempts since April to log into my exchange accounts but since I reset them no one has gotten in but I did get a bunch of emails from Binance and other exchanges where there were some failed attempts to log in.
And no, nothing in the outbox.
And yes I can sign from some of the old addresses but they won't mean anything as the hacker would have access to them as well.
You are quite lucky that the hacker didn't completely lock you out of your account by changing your email address after the password change or use it to scam unsuspecting members.
Try to keep your email address very secure. 2FA should be a must. Once your email address is compromised. Every account linked to it including exchange accounts could easily be accessed by the hacker through password resets.
That is what boggles my mind that someone got in DESPITE 2FA being active on ALL my accounts.
And google defaults to the new way of 2fa where you get a notification screen where you have to approve that you're signing in from a new device - I didn't get any of that when the hacker got into my email in April.
I was only notified when my DDIM tokens were being unstaked and I got that notification on Telegram. But It was already around 50 minutes late.
PS: I was stupid enough to have saved my master priv key sheet in the drafts of my email around Feb when I was doing a PC OS upgrade. And didn't care enough to delete it later.
Because in the back of my mind I knew no one could bypass my 2fa. I was wrong.After the hack, I did make a post on Linkedin and perhaps Twitter, seeking advice from security experts.
[moderator's note: consecutive posts merged]