Pages:
Author

Topic: Used a bot, easy password, etc for Just-Dice use Google Authentic! Compromised~! (Read 10055 times)

hero member
Activity: 728
Merit: 500
Please explain why enabling 2FA on withdraw is added security?

If someone just has username and password and 2FA is enabled on logging in they wouldn't be able to login in the first place to make the withdraw.

It's for when you leave your laptop unattended in a cafe with Just-Dice open ^^
hero member
Activity: 763
Merit: 500
Please explain why enabling 2FA on withdraw is added security?

If someone just has username and password and 2FA is enabled on logging in they wouldn't be able to login in the first place to make the withdraw.
newbie
Activity: 4
Merit: 0
I was one of the compromised accounts. Already PM'ed dooglus about it.
In case it helps anybody, I used the same user/pass combo (that has now been changed) also for weexchange, cex.io and thebitcoincompany.co.uk
sr. member
Activity: 602
Merit: 260
Thanks Douglas and the community at Just-Dice for donating the stolen bitcoins took from players
sr. member
Activity: 322
Merit: 250
legendary
Activity: 2940
Merit: 1333
He was talking about Casinobit  Wink

So he was.  Sorry for misunderstanding.
vip
Activity: 756
Merit: 503
Did not read that anyone got reimbursed. Anyway, his website use an URL as login so he can't have collected any user/pass.

I have only reimbursed 3 of the 16 accounts that lost funds so far.  I have blocked access to the others, and am waiting for their owners to contact me and demonstrate that they have secured their accounts before refunding them.

I expect most of them were old forgotten accounts with what their owners considered 'dust' in them.

JD uses URLs as a login until you set up and username and password.  Once you've done that, the URL no longer works.

He was talking about Casinobit  Wink

Quote
Did Casinobit recently "find" some bitcoins? if I recall some of the investors was recently paid "need source". So I guess we need to ask other victims, what bitcoin gambling companies have you joined and eliminate one by one?
legendary
Activity: 2940
Merit: 1333
Did not read that anyone got reimbursed. Anyway, his website use an URL as login so he can't have collected any user/pass.

I have only reimbursed 3 of the 16 accounts that lost funds so far.  I have blocked access to the others, and am waiting for their owners to contact me and demonstrate that they have secured their accounts before refunding them.

I expect most of them were old forgotten accounts with what their owners considered 'dust' in them.

JD uses URLs as a login until you set up and username and password.  Once you've done that, the URL no longer works.
sr. member
Activity: 602
Merit: 260
Well maybe I'll get some pledges this time for making a bot that won't steal anyones cash... Any interest in this?

There are already open-source bots available.

Could you provide us a list of "known bots" for the website Rannasha? Also we are currently looking for a seasoned veteran coder to review such bots to insure safety and security for players.

Here is mine, support included Smiley
https://github.com/KgBC/just-dice-bot

Is running as python cli application, which I consider as much more stable than running in a browser window (especially thru tor).
Always download it from the original source above, so noone could compromise code.
Have Fun gambling Smiley

Thanks will be coming with article soon, Douglas thanks for the hard work on analyzing actions from the perpetrator hopefully we have more info on this later on. Clearly they used an anonymous program but I show a potential IP out of London that might have been responsible. 
vip
Activity: 756
Merit: 503
- use different login/pass for each sites,

That seems to be the one that would have worked in this instance.

Someone had a list of usernames and passwords from a different site and tried them on Just-Dice.

Most of the usernames they tried didn't even exist on Just-Dice, but some did, and some of those use the same password as on the hacked site.

Some of those ones with the same username and password also had 2FA disabled, or had it enabled, but not required to withdraw.

Those are the people who lost coins.

The lesson here is twofold:

1) don't reuse passwords

2) do use 2FA when available

I'm sorry for people's losses.  It's an expensive way to learn about password security.  Sad

Incidentally, I would be very interested to learn which site the list of usernames and passwords was hacked from.  If your account was compromised and you only used the same account details on a few other sites, please list those other sites here so we can see if a pattern emerges.

I've checked the logs.  It appears that the amounts stolen were (in size order):

0.00018560, 0.00069031, 0.00930999, 0.00990000, 0.01006117, 0.01137880, 0.01773303, 0.02915000, 0.04515912, 0.04542498, 0.04976687, 0.08471695, 0.60705816, 0.88197790, 3.87314367, 60.07364941

Total: 65.74930596 BTC.  The stolen coins were sent to 1GtAri6QDusZVFPtCBufA7ti6R34BxRwBB (14 transactions) and 1sCaMzrzY6sCaRMUY9WjM35QnwHYLyBEd (2 transactions).

If anyone would like to donate to make the victims whole, I set up address 1GbDrpVNGxC8CxfZrYMPVPZ2KNwvcXEHT7 for donations.  Anything sent there will go to the 16 who lost funds.

Good Idea and with some reasonable problem solving we can probably find the source of this.  

Did Casinobit recently "find" some bitcoins? if I recall some of the investors was recently paid "need source". So I guess we need to ask other victims, what bitcoin gambling companies have you joined and eliminate one by one?



Did not read that anyone got reimbursed. Anyway, his website use an URL as login so he can't have collected any user/pass.
newbie
Activity: 55
Merit: 0
Well maybe I'll get some pledges this time for making a bot that won't steal anyones cash... Any interest in this?

There are already open-source bots available.

Could you provide us a list of "known bots" for the website Rannasha? Also we are currently looking for a seasoned veteran coder to review such bots to insure safety and security for players.

Here is mine, support included Smiley
https://github.com/KgBC/just-dice-bot

Is running as python cli application, which I consider as much more stable than running in a browser window (especially thru tor).
Always download it from the original source above, so noone could compromise code.
Have Fun gambling Smiley
b!z
legendary
Activity: 1582
Merit: 1010
so just to confirm -- this is just because people recycled usernames and passwords right?

I can't be sure.  It's possible that some of the usernames and passwords were collected using a keylogger on compromised users' computers.

Someone claiming to be the hacker was in the JD chat talking about their "java driveby", which I imagine is some kind of exploit.  Disable the java plugin in your browser if you have it installed.

This is what a java driveby looks like: http://www.xylibox.com/2012/07/sparkyjava.html

It will only be able to download and run malware if you allow it, which doesn't really make it an "exploit".
legendary
Activity: 2940
Merit: 1333
I also appreciate how open you've been about which accounts the hacker tried to access.

Oh, in case I wasn't clear, those are accounts the hacker DID access.  Most of them either had no funds or were protected by 2FA.  'Only' 16 of them had funds that the hacker was able to withdraw.
legendary
Activity: 1022
Merit: 1000
Dooglus said it best on the other JD thread:
Quote from: dooglus
Because casual players want as few barriers between them and the dice as possible.  They want to deposit, play, maybe withdraw winnings, and forget about the account.  Account registration and 2FA is boring.

For people intending to leave coins on their accounts though, it's clearly a good idea to use 2FA.

In short, this is not JD's fault.

I also appreciate how open you've been about which accounts the hacker tried to access.
legendary
Activity: 2940
Merit: 1333
Seems the sites fault...  the site should of had a type of 2 factor authentication on the withdraw system compulsary. like enter an emailed pin or what ever.  And a system that blocks users who login mulitiple wrong accounts, and also alerts the site admins something dodgie is going on.

I know you're new to Bitcoin gaming, but requiring users to register an email address typically doesn't fly.
legendary
Activity: 2940
Merit: 1333
so just to confirm -- this is just because people recycled usernames and passwords right?

I can't be sure.  It's possible that some of the usernames and passwords were collected using a keylogger on compromised users' computers.

Someone claiming to be the hacker was in the JD chat talking about their "java driveby", which I imagine is some kind of exploit.  Disable the java plugin in your browser if you have it installed.
sr. member
Activity: 322
Merit: 250
Neg trust, was left by competing casinos
Seems the sites fault...  the site should of had a type of 2 factor authentication on the withdraw system compulsary. like enter an emailed pin or what ever.  And a system that blocks users who login mulitiple wrong accounts, and also alerts the site admins something dodgie is going on.

Until thats implemented it will keep happening.
sr. member
Activity: 476
Merit: 250
so just to confirm -- this is just because people recycled usernames and passwords right?
legendary
Activity: 2940
Merit: 1333
I've checked the logs.  It appears that the amounts stolen were (in size order):

0.00018560, 0.00069031, 0.00930999, 0.00990000, 0.01006117, 0.01137880, 0.01773303, 0.02915000, 0.04515912, 0.04542498, 0.04976687, 0.08471695, 0.60705816, 0.88197790, 3.87314367, 60.07364941

If anyone would like to donate to make the victims whole, I set up address 1GbDrpVNGxC8CxfZrYMPVPZ2KNwvcXEHT7 for donations.  Anything sent there will go to the 16 who lost funds.

Thanks for all the donations.  A total of 2.40995525 BTC was received so far (not including the guy who paid one of the victims back in full privately).  That's enough to pay all but the biggest three back in full.  If I give the biggest 3 the same as the 4th, then it totals 2.696 BTC.  I'll make up the difference:

0.00018560 0.00069031 0.00930999 0.00990000 0.01006117 0.01137880 0.01773303 0.02915000 [0.04515912] 0.04542498 0.04976687 0.08471695 0.60705816 0.60705816 0.60705816 0.60705816

I will refund the victims as soon as they reclaim their accounts and enable 2FA.  I don't want the attacker withdrawing the refunds too!
legendary
Activity: 2940
Merit: 1333
Pages:
Jump to: