Pages:
Author

Topic: Thoughts on this private key stealing mystery - page 2. (Read 23320 times)

copper member
Activity: 8
Merit: 23
From the digging the user /u/n0mdep did on reddit, it appears to be an old PHP library issue, wallets using this library may be a possible source. One of the addresses ("1JCuJXsP6PaVrGBk3uv7DecRC27GGkwFwE") is mentioned in a 2017 PHP bitcoin shopping cart issue. https://github.com/coinables/Bitcoin-NoAPI-Shopping-Cart/issues/2
sr. member
Activity: 359
Merit: 251
If I were able to find a private key from an address with a decent amount I would really consider to go Robin Hood-ish on it...
There are so many people in desperate need that it would worth it
newbie
Activity: 44
Merit: 0
Mind=blown

Wrote a couple of scripts and tested myself. Shit is real. Take a look at this guy, for example. Last transaction only a couple of days ago:

https://blockchain.info/address/1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN

"Jeff was here" is all over the blockchain. Guess he (she/it) has a compiled majestic wallet with a script that immediately transfers any incoming transaction to his own safe addresses.

Congrats Jeff.

I've read your post and seen that you wrote a script for this, can I see the script that you wrote? I would like to know how it works and reverse engineer this particular script.
Please pm me. Thanks!
newbie
Activity: 2
Merit: 0
 I was trying to do the same steps pointed in the original article, but first of all I tried to get the whole database from the blockchain.
I used ABE library to copy the data from bitcoinCore to a SQL database, unfortunately, It take a looooong time to make this job. So, I was wondering if anyone could tell me how to make this job as faster as possible. I'm trying to do this as exercise. I'm new in the bitcoin world, but i'm used to programming in a python and C/C++ throughout my career.
Could anyone explain me the faster way to put the whole blockchain into a database?

Thanks for your time!
member
Activity: 129
Merit: 12
sha256(666) leads to 1Az4F5yC19WZt5XMuc6x11xJM81VcJyHQA which in 2014 received 666 satoshi. Hell, that's funny.
newbie
Activity: 12
Merit: 0
yes I also have been aware of that .. when I was found the private key made from the bitcoin address created from the "genesis-address transaction(block0)" .. and found there's a  transactions in that address.

.by the way ..who is the owner of this "vanity address eater" bot
(1aa5cmqmvQq8YQTEqcTmW7dfBNuFwgdCD)
Huh
  Grin

member
Activity: 129
Merit: 12
Mind=blown

Wrote a couple of scripts and tested myself. Shit is real. Take a look at this guy, for example. Last transaction only a couple of days ago:

https://blockchain.info/address/1HZwkjkeaoZfTSaJxDw6aKkxp45agDiEzN

"Jeff was here" is all over the blockchain. Guess he (she/it) has a compiled majestic wallet with a script that immediately transfers any incoming transaction to his own safe addresses.

Congrats Jeff.
full member
Activity: 322
Merit: 141
OK, this vulnerability got me thinking and really should be read by everyone so that we can all broaden our views a little bit. Bitfools commentary really made me laugh and I agree with him to certain extent, but I wouldn't say it is a fairy tale - it is obvious that this lady/guy has put some effort and at least I am glad there was a through research made by blockchain.info.

This case and case of Large Bitcoin collider shows us that, no matter how safe we believe the technology to be, we have to continue to read, research, study, and adapt. Always remember that the producers of Titanic believed it to be unsinkable and remember that the human race has a vast history of adopting something it had not been ready for yet (nuclear energy for example....).

sr. member
Activity: 266
Merit: 251
This might mean nothing, but I searched for a few of those addresses from the OP in walletexplorer, which is a site that guesses which service owns an address. It probably uses taint analysis.

It said a few of those addresses were part of a wallet it calls MtGoxAndOthers. These are three such addresses.

https://www.walletexplorer.com/address/1kN83e7WRtsXD7nHn51fwdEAi51qk5dEe

Quote
1kN83e7WRtsXD7nHn51fwdEAi51qk5dEe
part of wallet MtGoxAndOthers

https://www.walletexplorer.com/address/1JhWnRjRm7AhbvSBtEifcFL8DkEKQiWRZw

Quote
1JhWnRjRm7AhbvSBtEifcFL8DkEKQiWRZw
part of wallet MtGoxAndOthers

https://www.walletexplorer.com/address/1BEYFim8uoJ7FAZG6m1E1hqLwKjfVwnWU1

Quote
1BEYFim8uoJ7FAZG6m1E1hqLwKjfVwnWU1
part of wallet MtGoxAndOthers

I don't know how reliable walletexplorer's guesses are, and I'm only speculating it uses taint analysis to make its guesses. Walletexplorer couldn't guess where most of the small fraction of addresses I checked from the OP came from, it only guessed those three.

However, I only checked a small fraction of the list, I don't have time to check them all. Also the coins sent to all three addresses were sent after February 2014 when Mt. Gox had closed and filed for bankruptcy protection.

I don't understand how walletexplorer guessed that an address unused before Mt. Gox closed could belong to "MtGoxAndOthers" based on a transaction sent after its closure. Maybe it's because "MtGoxAndOthers" is a very vague name.

legendary
Activity: 2926
Merit: 1386
Wow  Shocked

Amazing discovery of a amazing coup. The guy who made this and the guy which discovered it are pure genious.

I am really excited to find out in which priv key generation code this thing is implemented.

Amazing, if any of it were true, Upon reviewing this article, I took to myself to spend 1/2 hour and run some of these things, I have a database of 5 million BTC addresses, and every public-key ever used, both hashed and open, and I ran the addresses though the system, I found less than 1,000 addresses have been used as 'seeds', and I found of that only 'one' had ever had a transaction, ... Not VERY INTERESTING .....
IMHO this article is a sci-fi fairy-tale that can be told to bitcoin wannabe's and their boyfriends.

I am afraid arguing "against this" is like arguing against the theory of God.

You cannot prove your point.

There are an infinite number of possible variations on the embedded hints and seeds and secrets.

For example, assume not that "seed" is embedded and with "seed you can discover the private key.

Now consider k=numeric value(seed)+c

Where c is a constant.

Have fun....
legendary
Activity: 3542
Merit: 1965
Leading Crypto Sports Betting & Casino Platform
Blockchain.info has a bit of a reputation regarding flaws in their code : https://www.coindesk.com/blockchain-info-issues-refunds-to-bitcoin-theft-victims/ and I guess something like this might go undetected, if they took that long to discover that.

Blockchain.info will deny this, like most Banks do, when exploits are discovered in their software.

This is why Satoshi did not recommend using third party software/wallet providers, but as usual nobody is listening and they use the GUI friendly options out there.
member
Activity: 112
Merit: 12
Wow  Shocked

Amazing discovery of a amazing coup. The guy who made this and the guy which discovered it are pure genious.

I am really excited to find out in which priv key generation code this thing is implemented.

Amazing, if any of it were true, Upon reviewing this article, I took to myself to spend 1/2 hour and run some of these things, I have a database of 5 million BTC addresses, and every public-key ever used, both hashed and open, and I ran the addresses though the system, I found less than 1,000 addresses have been used as 'seeds', and I found of that only 'one' had ever had a transaction, ... Not VERY INTERESTING ( So somebody ( most likely the OP, created 1,000 private-keys on BTC using 'address' as the SEED, but never used them, ... so what? ); Sounds like somebody was bored that day, and ran a batch file that terminated at 1024

Then there is the BS about using tx's and merkels for your private-key, or hashing them, these are just random numbers after they're hashed, there was NO 'order' to begin, with hashing high-entropy, is high-entropy, if you want to cultivate private-keys for REAL that have been used ( that's the GOAL right?) Then you need to leverage off the human weakness issue and that is seeds need to have a deterministic nature that came from humans, not random shit.

The OP lists 5 ways to 'hack-btc' I found all to be non-workable, certainly if it be true that a few of these were places as back-doors by a wallet 'engineer' ok, I can dig that, but looking at this stuff from 'hacker' point of view its all a waste of time,

Of the 5,  only the one about seed('cat') times N ( running sha256() n times on the result )  was interesting, the OP makes it sounds like he found many where N > 1, ... but the reality is such that if you take all known seeds, and start N'ing them by N++, you will vanish to zero at 2, ... sure you might be lucky and one time at seed*1975 get one hit, ... but that is just an anomaly

The fact is this kind of stuff in real world would be from 'hand rolled' private addresses and its just not that common, unless the guy is an engineer and hand-rolls from SSL, or that is high-entropy, that works.

Given that using random data from the block-chain for your private-key; hashed or not is a jerks game, and thus by definition a JERK has no BTC, thus its a complete waste of time for a 'professional hacker' to follow any information in this post.

IMHO this article is a sci-fi fairy-tale that can be told to bitcoin wannabe's and their boyfriends.
member
Activity: 112
Merit: 12
Quote
echo -n "1Ca15MELG5DzYpUgeXkkJ2Lt7iMa17SwAo" | sha256sum
9e027d0086bdb83372f6040765442bbedd35b96e1c861acce5e22e1c4987cd60

That hex number is the private key for 15ZwrzrRj9x4XpnocEGbLuPakzsY2S4Mit !!!

This is not the case. The private key for that hex address is 5K1sjALvVxbsTRMf3aGKnB6E39uZfqQ6XQTGh5z3DrBDq3pG9A6 and its address is 18JT3KeFV36Hkgo3Xi9bfgNYAXCVXBGyFg.
Have you considered protecting the corresponding bitcoin cash wallets ? At least one of them got raided after your publication.


private address in HEX 9e027d0086bdb83372f6040765442bbedd35b96e1c861acce5e22e1c4987cd60
private address in WIF 5K1sjALvVxbsTRMf3aGKnB6E39uZfqQ6XQTGh5z3DrBDq3pG9A6

[ but there are two wifs L2Wru6Ew8pQuhcWAvMpdtPY4YWK1CQcwPCWxFvzkoi47crJBAVaP ]

Then address is 18JT3KeFV36Hkgo3Xi9bfgNYAXCVXBGyFg

But there is only the compressed address ... 15ZwrzrRj9x4XpnocEGbLuPakzsY2S4Mit

There is no balance on this private-address

IMHO, having done this stuff for a solid six months after a double hiatus from bitcoin in 2011, and 2013, I have seen very little to nothing come of these types of 'looking for private keys', just hashes in generals that they them selves came from hashes is just shit from shit, you still get shit, a lucky monkey on a type write can also generate 'war and peace', given enough time.

There are 10k ways to HACK bitcoin, there are a zillion paths to be taken, one must test them all to find that path that works for them, certainly you don't want to follow the 'pack' in this shit, as it will lead you to NO WHERE.

Probably best advice for people serious about this game is ...

1.) Study the C++ code for bitcoin, as none of the docs are real, its all bullshit, only the code is real
2.) roll you own, write your own parsers ( block chain to text, its probably best to do CSV), most of the database programs can handle 200GB very well; probably best c/c++ & python
3.) have many databases that are selective for each mission, one for addresses, one for balances ( short life ), one for public-keys, ..
4.) Have many bloom-filters for all of the above, searching for the monkey means O(1) search time, you can have just a bloom for address, you need blooms for your rain-bow table, for your private-key warehouse, for your public-keys, for your ecdsa integer farm, ...
5.) getting back 2, none of the code on github works, I mean NONE, its not maintained, and it will all lead you to dead ends, if a guy actually wrote a 'bot' that harvested valuable addresses and swept those accounts he would NOT give that software away for free, 99% of the shit you find on GITHUB is somebody's dead-end,
6.) study all the papers on the subject, there are 1,000's of well written technical papers on ECDSA SECP256, read them all, write your own sig ecdsa software write your own hash library, vector everything, always place vector check points every few 100 steps so you know everything is working.
7.) there are 1,000's of variables, and it only takes one to generate false-positives, know at all times that all  your inputs are correct,

8.) have a bell or timer set to generate music, I have a A-G guitar chord set,so depending up what my bots find, they play the different chord sets so that I know the nature of the problem, and the chord set doesn't nauseate people  around the house

9.) I find that hacking BTC is harder than mining, but far more interesting,

10.) Don't be a fool, if you don't have years of experience in programming, cryptograhy, database, networking, math, physics, then your chance of making any kind of interesting discovery is nil; Lots of smart people working on this "Discrete Log Problem" for a long time, if it were an easy problem, then it would have been solved, I think some 50 years since computers have been generally available people have been trying to solve this problem by brute-force

11.) like I said there are 10k ways to hack btc, there is the address angle, the public-key angle, the random priv-key angle, ... the ecdsa pool angle, ... you need to really play around with all until you find a method that works for you, then dive deep and really understand why your succeeding, don't try to do them all, there is too much, just doing the ECDSA can be a full time job for a mathematician

...

Most of this stuff is done for intellectual curiosity IMHO its to much work for the 'get rich quick moron' which are the majority of this board, its far easier to clone your own coin, start your own mining pool, or exchange and rip people off if you goal is to 'steal', most of us when we do find coin, are more than happy to make note of the find to the owner.

It's a vast multi-disciplinary field 'hacking btc', I can see it become a major career path, there are already dozens of masters thesis written on this subject, bound to be many phd's born of this stuff

For the young kid, I can offer no better path than BUTERIN did, first study the BTC source, and master that, then write your own btc client/server in python, and completely understand all, then modify your source so it can output 'data' as you want, ... Most of the 'action' is happening now, most of the easy stuff that is talked about in papers or this forum is what happened in 2014 or earlier, ... unless you write your own client/server that is tuned to study the now, your not going to make 'great' discovery's.

Passive Analysis is still wide open, very little work has been done on the block-chain using machine learning or digital signal processing techniques, but then again like the stock-market, what bitcon did in the past in terms of private-key generation means nothing tomorrow, as the core-devs are constantly hacking the code, and fixing the 'holes', thus to find the new holes, you must stay one step ahead of the core-devs,
legendary
Activity: 2646
Merit: 1138
All paid signature campaigns should be banned.
Sending coins back to the address they came from could just end up losing the coins permanently, because now days wallets do not re-use addresses, and the original owned might not have that address in his wallet anymore.

I'm very interesting in this. Where do you find such kind of information? If you have seed, it will contain ALL addreses (used and not-used). With it you will be able to get access to any address which you were used.
You are correct, aplistir does not know what they are talking about.  Modern HD wallets remember all used addresses. 
newbie
Activity: 49
Merit: 0
its not a good idea because if there are valuable coins there,the owners are doomed to loose it,when the keys get into the hands of real hackers  Huh
sr. member
Activity: 377
Merit: 282
Finis coronat opus
Sending coins back to the address they came from could just end up losing the coins permanently, because now days wallets do not re-use addresses, and the original owned might not have that address in his wallet anymore.

I'm very interesting in this. Where do you find such kind of information? If you have seed, it will contain ALL addreses (used and not-used). With it you will be able to get access to any address which you were used.
newbie
Activity: 5
Merit: 1
I wonder if there's a connection with bitpay/copay. I found a transaction id as the privkey of a wallet (143o1wchhdN58FXcXreEKYvsihYQuFEQPN) that sends its coins to one of the known vacuum addresses. Right prior to it, it receives funds from 1MhxhzAQGktuQvx7ykhpomMeB8WnzBFeVi. The latter wallet received a transfer from 3QyUSB4eRYePHcvpS6k6YDMBUDGXRSSMPc prior to that. That address is mentioned on https://github.com/bitpay/copay/issues/4017

Might it be co pay transaction logic at play here?
newbie
Activity: 19
Merit: 0
Wow  Shocked

Amazing discovery of a amazing coup. The guy who made this and the guy which discovered it are pure genious.

I am really excited to find out in which priv key generation code this thing is implemented.
newbie
Activity: 5
Merit: 1
The md5hashing.net being a source of generation makes sense as well. Read this first: https://www.reddit.com/r/Bitcoin/comments/2c5jot/my_18_stolen_bitcoin_were_spent_today_25_bounty/

This guy's bitcoins were stolen about 3 years ago from 1CwUog8nftdpC6RXygFcwzTKEATDCE4b9T.
The private key to that wallet is 5KHRvbqGXw4mcsdamWYK2EH515tXRXHr199qZr2ziC9NdEEd7tV. Its private
key is derived from sha256(ywAEqHEdZkVM4phdRa6URuZY8SAOjPa169G881ARuaIwxa4f1i), a string
searched for on md5hashing.net. Sites such as these may very well be honey pots.
newbie
Activity: 5
Merit: 1
Quote
echo -n "1Ca15MELG5DzYpUgeXkkJ2Lt7iMa17SwAo" | sha256sum
9e027d0086bdb83372f6040765442bbedd35b96e1c861acce5e22e1c4987cd60

That hex number is the private key for 15ZwrzrRj9x4XpnocEGbLuPakzsY2S4Mit !!!

This is not the case. The private key for that hex address is 5K1sjALvVxbsTRMf3aGKnB6E39uZfqQ6XQTGh5z3DrBDq3pG9A6 and its address is 18JT3KeFV36Hkgo3Xi9bfgNYAXCVXBGyFg.
Have you considered protecting the corresponding bitcoin cash wallets ? At least one of them got raided after your publication.

There's a few more wallets in the blockchain that have corresponding "target" wallets. I've traced quite a few. I suspect the grouped 0.0001 BTC transfers are signallers. Not strictly necessary, but allowing for easy recognition. I found one of the addresses to be associated with a btc lottery service, though I have a hunch that many of the addresses that are being 'watched' are actually hashes / strings that were pasted on md5hashing.net. If you set your user agent to google bot you can scrape those pages. Run them through sha256 / use hashes as keys and you'll see what I mean. I even found password 1975 on there, though that might've been tried on there in response to your publication.



Pages:
Jump to: