This forum is in archive mode. You will not be able to post new content.

Author Topic: Bitmessage Users Get Socially Engineered, Badly  (Read 727 times)

0 Members and 1 Guest are viewing this topic.

Offline vezzy

  • Royal Highness
  • ****
  • Posts: 771
  • Cookies: 172
    • View Profile
Bitmessage Users Get Socially Engineered, Badly
« on: August 31, 2013, 11:56:26 PM »
http://secupost.net/

What actually happened:

http://www.chronicles.no/2013/08/bitmessage-crackdown.html
https://bitcointalk.org/index.php?topic=278757.0

Basically some guy massively spammed Bitmessage users with a message that claimed several cryptographic weaknesses were unearthed in the Bitmessage protocol, linking to his attack site that mapped BM addresses to IPv4 addresses, ISPs and user agents. On the user's end, all they saw was a false 500 error.

This is the miner code he used to send so much messages (OpenCL magick):

https://github.com/bm-robertwhite/bitmessage-powfaster
Quote from: Dippy hippy
Just brushing though. I will be semi active mainly came to find a HQ botnet, like THOR or just any p2p botnet

 



Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.