Page 1 of 2 12 LastLast
Results 1 to 25 of 46

Thread: Important! Please read: Mt gox hacked, all accounts were leaked

  1. #1
    Xtreme Member
    Join Date
    Mar 2009
    Location
    ATL/CLE/YYZ
    Posts
    791

    Important! Please read: Mt gox hacked, all accounts were leaked

    UPDATE 06/20: looks like the same thing may be transpiring at Trade Hill

    An anonymous blog post claims to have hacked trade hill and is offering to sell password hashes. I would take this seriously at this point.

    If you used your tradehill password anywhere else, I would change this now.


    Guys,

    The hacker group known as Anonymous just broke into Mt. Gox, crashed the market, then proceeded to LEAK all account info.

    Luckily, the password is stored in a hash, but, given Mt. Gox's weak encryption methods, some (if not all) of the hashes are already cracked, revealing your true password.

    I saw the file. And, yes, my email is in there.

    If you used that password ANYWHERE ELSE, be sure to change it ASAP.

    It was just a matter of time before this happened. Mt. Gox is essentially run from a dude's basement, in the grand scheme of things.
    Last edited by artemm; 06-20-2011 at 11:26 AM.
    XS WCG: Voiding warranties for a good cause. Join us!



  2. #2
    Lil' Red Devil
    Join Date
    Jun 2002
    Posts
    251
    thank you
    Beat on it till its BROKEN

    Then you can say you did it right



    Heatware 405-0-0

  3. #3
    Xtreme Member
    Join Date
    May 2009
    Location
    São Paulo, Brazil
    Posts
    317
    There are no keys to hashing functions: they're not reversible. The only way to break them is brute force, which is next to impossible with proper salting (hopefully the guys at Mt. Gox were at least half competent on that area).

  4. #4
    Xtreme Member
    Join Date
    Mar 2009
    Location
    ATL/CLE/YYZ
    Posts
    791
    true, but you should change all other instances of that password just in case. MD5 was probably used with no salting (worst case scenario.) That can be brute-forced in no time. Honestly, Mt. Gox is a one man operation. The guy running it didn't even notice the breach until the damage was done AND the market managed to correct itself.
    XS WCG: Voiding warranties for a good cause. Join us!



  5. #5
    Xtreme Cruncher
    Join Date
    May 2007
    Location
    Chicago
    Posts
    701
    Thanks for the heads up, looks like quite a mess. Glad I pulled everything off of mtgox after the claims of hacking recently.


  6. #6
    Xtreme 3D Team
    Join Date
    Jan 2009
    Location
    Ohio
    Posts
    8,499
    Quote Originally Posted by Deux View Post
    Thanks for the heads up, looks like quite a mess. Glad I pulled everything off of mtgox after the claims of hacking recently.
    https://support.mtgox.com/entries/20...count-rollback

    UPDATE REGARDING LEAKED ACCOUNT INFORMATIONS

    We will address this issue too and prevent logins from each users. Leaked information includes username, email and hashed password, which does not allow anyone to get to the actual password, should it be complex enough. If you used a simple password you will not be able to login on Mt.Gox until you change your password to something more secure. If you used the same password on different places, it is recommended to change it as soon as possible.
    Smile

  7. #7
    Xtreme Member
    Join Date
    May 2009
    Location
    São Paulo, Brazil
    Posts
    317
    Quote Originally Posted by artemm View Post
    true, but you should change all other instances of that password just in case. MD5 was probably used with no salting (worst case scenario.) That can be brute-forced in no time. Honestly, Mt. Gox is a one man operation. The guy running it didn't even notice the breach until the damage was done AND the market managed to correct itself.
    The passwords were salted, you can test it yourself: the part between the start of the string and the third $ is the salt, and the rest is the output of PHP's crypt function.

    The hash of my password in the leak is
    Code:
    $1$pbC0WhDK$06aoDZXms.RuV9gQB037B.
    The following PHP script yields the correct hash, and you can use it yourself to see if your most current password was leaked.

    PHP Code:
    <?php 
    print(crypt('<my real password>''$1$pbC0WhDK'));
    ?>

  8. #8
    Xtreme Member
    Join Date
    Mar 2009
    Location
    ATL/CLE/YYZ
    Posts
    791
    There's also the issue of 61 thousand leaked live emails that will now be going into x spam lists... Sigh, and that email was relatively spam free. Guess that's about to change.

    This is going to rock investor confidence to the core. I'd be shocked if the BTC price will go anywhere near where it was when the attack occurred.
    XS WCG: Voiding warranties for a good cause. Join us!



  9. #9
    Fanboy of Good Products
    Join Date
    Oct 2008
    Location
    FL
    Posts
    4,050
    crap. i can't remember which email i used but if it's my main email then i'm probably screwed too. sigh.. it was so spam free unlike my yahoo email..
    Cruncher #1: EVGA Z68 FTW | i7-2600k @ 4.5 | 6GB Ram
    Cruncher #2: Supermicro Dual-Socket | 2 x 6-core Opterons | 4GB Ram
    Cruncher #3: 8-core Xserve 1,1

    T400 for non-crunching



    "But don't think you'll run me over - It's, ah, planting season here in Texas... and the farm is growing..." -Otis11 on crunching WCG

  10. #10
    Xtreme Member
    Join Date
    Mar 2009
    Location
    ATL/CLE/YYZ
    Posts
    791
    Update: 300 cracked hashes already posted. It allegedly took only 10 seconds.

    Change that password, people. It's going to get cracked and will be out in the wild in no time.
    XS WCG: Voiding warranties for a good cause. Join us!



  11. #11
    Xtreme Member
    Join Date
    Aug 2008
    Location
    Poland
    Posts
    199
    Where can I see the leaked database ?

  12. #12
    Coat It with GOOOO
    Join Date
    Aug 2006
    Location
    Portland, OR
    Posts
    1,608
    hehe, good thing i used a brand new password for this and the spam email account
    Main-- i7-980x @ 4.5GHZ | Asus P6X58D-E | HD5850 @ 950core 1250mem | 2x160GB intel x25-m G2's |
    Wife-- i7-860 @ 3.5GHz | Gigabyte P55M-UD4 | HD5770 | 80GB Intel x25-m |
    HTPC1-- Q9450 | Asus P5E-VM | HD3450 | 1TB storage
    HTPC2-- QX9750 | Asus P5E-VM | 1TB storage |
    Car-- T7400 | Kontron mini-ITX board | 80GB Intel x25-m | Azunetech X-meridian for sound |


  13. #13
    Crunching For The Points! NKrader's Avatar
    Join Date
    Dec 2005
    Location
    Renton WA, USA
    Posts
    2,891
    i am ANONYMOUS!

  14. #14
    Fanboy of Good Products
    Join Date
    Oct 2008
    Location
    FL
    Posts
    4,050
    Quote Originally Posted by artemm View Post
    Update: 300 cracked hashes already posted. It allegedly took only 10 seconds.

    Change that password, people. It's going to get cracked and will be out in the wild in no time.
    Password to what? Mt Gox? email? I guess anything that resembles the stolen password huh..
    Cruncher #1: EVGA Z68 FTW | i7-2600k @ 4.5 | 6GB Ram
    Cruncher #2: Supermicro Dual-Socket | 2 x 6-core Opterons | 4GB Ram
    Cruncher #3: 8-core Xserve 1,1

    T400 for non-crunching



    "But don't think you'll run me over - It's, ah, planting season here in Texas... and the farm is growing..." -Otis11 on crunching WCG

  15. #15
    Crunching For The Points! NKrader's Avatar
    Join Date
    Dec 2005
    Location
    Renton WA, USA
    Posts
    2,891
    Quote Originally Posted by shoota View Post
    Password to what? Mt Gox? email? I guess anything that resembles the stolen password huh..
    im changing my door locks right now.

  16. #16
    Fanboy of Good Products
    Join Date
    Oct 2008
    Location
    FL
    Posts
    4,050
    Quote Originally Posted by NKrader View Post
    im changing my door locks right now.
    Be careful of the Boogey Man!! still want this board btw?
    Cruncher #1: EVGA Z68 FTW | i7-2600k @ 4.5 | 6GB Ram
    Cruncher #2: Supermicro Dual-Socket | 2 x 6-core Opterons | 4GB Ram
    Cruncher #3: 8-core Xserve 1,1

    T400 for non-crunching



    "But don't think you'll run me over - It's, ah, planting season here in Texas... and the farm is growing..." -Otis11 on crunching WCG

  17. #17
    Xtreme Enthusiast
    Join Date
    Jun 2008
    Location
    Northern Ohio
    Posts
    664
    Between anon and lulz, being an interweb user is becoming scary.

    I bet it was a SQL inject. I had pondered testing their screens with injects just to see how stable they were, since the site looked like it was made by a guy that just got done reading "My First HTML page". I just assumed with the number of people using it the thing was function over form.


    Work/Game System - ~24/7 WCG
    ASUS P8P67 PRO / i7 2600k @ 4.1Ghz / Gigabyte Radeon HD5870 / 4x4GB Corsair Vengeance @ 1600Mhz 9-9-9

    HTPC -~24/7 WCG
    Gigabyte GA-Z68AP-D3 / i7 2600k @ 4.0Ghz / Sapphire Radeon HD5830 / 2x2GB Mushkin Enhanced Essentials @ 1333Mhz 9-9-9

    XS WCG Team Forum - http://www.worldcommunitygrid.org/

  18. #18
    Registered User
    Join Date
    Apr 2010
    Posts
    15
    Quote Originally Posted by artemm View Post
    Guys,

    The hacker group known as Anonymous...

    I thought they were more in the "releasing emails from a company that worked with the gov and banks to screw over some journalist because they didnt like what they were doing" business.
    Link

    ok, they did call for sony ddos, but later said it was a mistake because it only affected their customers.


    Releasing customer data from some random online company is hardly their mo.



    D

  19. #19
    Xtreme Enthusiast
    Join Date
    Jun 2008
    Location
    Northern Ohio
    Posts
    664
    Quote Originally Posted by dangaroos View Post
    I thought they were more in the "releasing emails from a company that worked with the gov and banks to screw over some journalist because they didnt like what they were doing" business.
    Link

    ok, they did call for sony ddos, but later said it was a mistake because it only affected their customers.


    Releasing customer data from some random online company is hardly their mo.



    D
    I was thinking that as well, however they were the first one to tweet about it right after the selloff happened, so it's possible. I assumed it was lulz not anon myself.


    Work/Game System - ~24/7 WCG
    ASUS P8P67 PRO / i7 2600k @ 4.1Ghz / Gigabyte Radeon HD5870 / 4x4GB Corsair Vengeance @ 1600Mhz 9-9-9

    HTPC -~24/7 WCG
    Gigabyte GA-Z68AP-D3 / i7 2600k @ 4.0Ghz / Sapphire Radeon HD5830 / 2x2GB Mushkin Enhanced Essentials @ 1333Mhz 9-9-9

    XS WCG Team Forum - http://www.worldcommunitygrid.org/

  20. #20
    Xtreme Cruncher
    Join Date
    Mar 2005
    Location
    Houston
    Posts
    1,066
    found my username and email in the file. All passwords have been changes.

    #$#%#$@% Hackers!!

    312 Xeon Threads + GTX 1080 + GTX 1070 + BFL Monarch 700

  21. #21
    Crunching For The Points! NKrader's Avatar
    Join Date
    Dec 2005
    Location
    Renton WA, USA
    Posts
    2,891
    Quote Originally Posted by dangaroos View Post
    Releasing customer data from some random online company is hardly their mo.

  22. #22
    I am Addicted!
    Join Date
    Feb 2006
    Posts
    1,772
    I'm glad I am not with this one, but I'm sure it won't be long to get all the others. Dammit I didn't use my head. Used my main email and main password like an idiot. will keep an eye on everything
    XTREMESupercomputer: Phase 2
    Live up to your name - May 1 - 8
    Crunch with us, the XS WCG team

  23. #23
    ...
    Join Date
    Nov 2001
    Location
    Wichita, KS
    Posts
    4,598
    i'm a bit curious as to who exactly would be at risk here? i tried bitcoin on my rig here, but it couldn't do it, so i haven't been running it... but no clue what this Mt gox stuff is... anyone mind explaining a bit more for those who aren't really sure wtf is up?

  24. #24
    Xtreme 3D Team
    Join Date
    Jan 2009
    Location
    Ohio
    Posts
    8,499
    Quote Originally Posted by IFMU View Post
    i'm a bit curious as to who exactly would be at risk here? i tried bitcoin on my rig here, but it couldn't do it, so i haven't been running it... but no clue what this Mt gox stuff is... anyone mind explaining a bit more for those who aren't really sure wtf is up?
    We run bitcoin miners...

    These miners solve complex math equations and generate bitcoins for the bitcoin economy (kind of like the govt printing money) but instead we are the ones printing it.

    Once we have our bitcoins, we go to websites like Mt. Gox where we sell our bitcoins from our digital wallet to someone elses digital wallet for USD. Be it an investor that believes in the future of bitcoins or someone that is buying in hopes the market value will increase in the future. It is a currency exchange, bitcoins are a form of currency.

    ...problem is, if you have an account on Mt. Gox with bitcoins in it waiting for sell (or money in your Mt. Gox account) it can be stolen like was the case today.
    Smile

  25. #25
    ...
    Join Date
    Nov 2001
    Location
    Wichita, KS
    Posts
    4,598
    ok so if i've never tried to buy or sell the bitcoins, i pretty much don't have anything to worry about then?

Page 1 of 2 12 LastLast

Bookmarks

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •