Hello!
We wanted to warn everyone about a user on this forum. The user is hauzenberg -> profile link:
https://bitcointalksearch.org/user/hauzenberg-3122651This user has found an exploit on our website
www.playbitcoingames.com in several of our games, and has been exploiting it with several multiaccounts since February. To date, he has stolen over 1BTC from our website, usually being active once per month, pretending to be a "High roller", so we would be less supicious of his actions and assume he is legit, and just being lucky.
He was essentially betting huge on our bets, and appearing to be very lucky in several of our games. We had several investigations at various points, but were not able to prove any exploit being used, and just kept attributing his unbelivable winning streak to good luck. In the beggining this still made sense as up to a few thousand plays it still felt potentially legit, but as it kept happening month to month, it became increasingly clear something is off.
But as we have been understaffed and were not able to look really in-depth in this, and as we tried to maintain a good reptuation, we kept approving his cashouts -> he also clearly made an account here only to pressure us publicly into approving his wins, and unfortunately it kind of worked.
Just over a week ago, we looked into it again, and digging through server logs, and looking for patterns, noticed there was something weird -> essentially it seemed as he was able to predict with basically 100% accuracy his big bets on big wins (but he faked it down to 50%, to not appear as crazy, to what should've been 10-30% chances) – we looked as far down as our http/apache logs to look at server requests, and found he was indeed spoofing & creating various bets with invalid data and in specific orders, to find exploits in some of our game's md5/pregenerated results system.
As we noticed some suspicious activity reading his activity on this forum on other casinos, we wanted to alert all of you of this user, and if he is also "seeming lucky" on your casino, to investigate him THOROUGHLY.
Here is all the information we have on this user:
- he uses VPNs, but is usually sloppy/lazy and mostly uses German VPNs
- his emails are in 99% cases disposable ones @protonmail.com, so we'd suggest to be vary and check any users using those emails as well.
- here are several emails we confirmed to use the same exploits (which are him or even his friends):
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
[email protected]- there's likely a ton of others he used to abuse our free offers/free spins, but that's not as such a big issue to us, and "impossible to prove"
- Here is a list of several of his Ips, confirmed to be exploiting: 185.210.217.132, 152.89.163.172, 178.239.198.228, 178.239.198.30, 136.144.17.12, 193.37.255.216, 45.123.117.25, 31.171.152.37, 178.239.198.196
- here are some of his bitcoin withdrawal addresses he used: 1ESZGM1kXuk8TXZQzcXdaZsSXFYeHUNBh8, 1CmM4YH5yx9H6aN1Bi63ptJo5crMrKwrxX, 168v8C5TdYR6MyfHGC4HMLWXJxNXeKBBC4,193uKVVxE2eu3eWdgHsJxskoJkrvNpQSQo, LZgiWgeEw6VdqNYnr9DZe1VS4xBwaG5awU,15UPnMwhmAqdLsdFeGVMKVLN7dVVPUKPnE , 15KxaAfdDLDmYPWPCviGF6Yzi47RZoJKM2, 1Mk8osiWVHfdWmpbeYYYsiC3rSNGfdUWmA
I can't share exact details of what he did in our site, but essentially he found a way to send additional and/or requests with adjusted data, to trigger some cases where he was able to get unhashed result for the next play before the next play or before play ended, and adjust/increase his bet. It was caused by some coding inconsistencies in some of our games.
We hope any of this information helps, as we are 100% confident he has tried abusing other casinos as well – and very likely successfully, as otherwise he wouldn't keep doing this.
Kind regards.