dree12 (OP)
Legendary
Offline
Activity: 1246
Merit: 1085
|
 |
April 19, 2014, 01:57:16 AM Last edit: November 16, 2014, 12:00:24 AM by dree12 |
|
Bitscalper Scam[18] Time: January 2012 to March 2012 Suspects: - Alberto Armandi
- bitdaytrade @BitcoinTalk
- bitscalper @BitcoinTalk
- jjfarren @BitcoinTalk
Victim: Users of Bitscalper Status: MiningBuddy (bitcointalk.org user) attempted to reorganize bitscalper, but failed. No coins have been returned at all. Amount: Lower bound 1350 BTC[19] Equivalent in USD: 6461 $ Equivalent in January 2014 BTC: 8.16 BTC Bitscalper was founded as an arbitrage engine, and users were invited to deposit money. It was promising extremely high and unrealistic returns. As a result, it was suspected of being a scam from the beginning, fears that were compounded due to a shady and anonymous management. After Bitscalper shut down without returning user funds, BitcoinTalk user MiningBuddy attempted to reform Bitscalper using the remnants of the engine. However, no success was found and the coins could not be returned.
Andrew Nollan Scam[20] Time: February 2012 Victim: Investors of Shades Minoco, creditors of bitcointalk.org user shakaru, investors of BitArb Status: Andrew Nollan (a.k.a. shakaru[21]) (thief) known but disappeared, repaid some (not included in amount) Amount: Lower bound 2211.07786728 BTC, possibly more [22] Equivalent in USD: 10895 $ Equivalent in January 2014 BTC: 14 BTC
Linode Hacks Time: Late 2012-03-01, Early 2012-03-02 Victim: Bitcoinica, Bitcoin.cz mining pool (Marek Palatinus), Bitcoin Faucet, possible others Status: Thief unknown, not caught. Linode employee suspected. Amount: Lower bound 46653.46630495 BTC Composition of amount:
- Bitcoinica: 43554.02005417 BTC[23]
- Bitcoin.cx: 3094.45825078 BTC[24]
- Bitcoin faucet[25]: 4.98800000 BTC[26]
Equivalent in USD: 223278 $ Equivalent in January 2014 BTC: 282 BTC Transactions of interest:
- 5a09f4ef0e91bc7bc044365cd27236fe4ac3c02088ac21ab51c93c8a11d33d4b
- 7b45c1742ca9f544cccd92d319ef8a5e19b7dcb8742990724c6a9c2f569ae732
- 901dbcef30a541b8b55fae8f7ad9917ef0754bda5b643705f3773e590785c4d3
- a57132e2cbc580ac262aa3f7bac1e441d6573f9633118bc48009618585a0967e
- a82ad85286c68f37a2feda1f5e8a4efa9db1e642b4ef53cb9fd86170169e5e68
- ff04763e3e8c93e43799dbbca833e183faad7e2611f20f136f47c2f1049481ae
- 0268b7285b95444808753969099f7ae43fb4193d442e3e0deebb10e2bb1764d0
- 34b84108a142ad7b6c36f0f3549a3e83dcdbb60e0ba0df96cd48f852da0b1acb
- 14350f6f2bda8f4220f5b5e11022ab126a4b178e5c4fca38c6e0deb242c40c5f[25]
In early March 2012, the New Jersey-based web and cloud hosting company Linode was suspected of robbing many popular Bitcoin services. A vulnerability in the customer support system was used to obtain administrator access to the servers. Once the Linode servers were compromised, eight accounts dealing with bitcoins were targeted.[27] The hardest hit was the bitcoin trading platform, Bitcoinica. This resulted in the unauthorized transfer of BTC from the hot wallets, a term used to describe operational withdrawal wallets, of the services affected. A severe bitcoin-denominated theft, the Linode theft also affected Tradehill, but no coins were stolen from them; instead, Tradehill had a short downtime because of the incident. In the aftermath of this theft, all the services migrated to other platforms. To this day, Bitcoin users fear Linode and usually refrain from using its services.
Betcoin Theft Time:
Event | Time | Theft Commences Transaction: #1, #2 | 2012-04-11T10:55:54 | Theft Continues Transaction: #3 | 2012-04-11T12:15:49 | Theft Culminates Transaction: #4 | 2012-04-11T12:43:14 | All times are blockchain time, and have possible error of up to 3 hours. Victims: Betco.in, creditors Status: Hacker not known. Some of creditors' deposits were repaid, around 2900 BTC outstanding.[28] Amount: Exactly 3171.50195016 BTC[29] Equivalent in USD: 15534 $ Equivalent in January 2014 BTC: 19.5 BTC Transactions of interest:[30]
- 266e4682abdf4932c4c271872ca9ba6bfdbe75941eb9ba4c4d81e4d3c7364e4b
- 40fc8f6b2f222fb2871a38a245132ed1eada9ff6aec8d46ebe74b29c64fd82a7
- bf70ac1d2b702dbe0e14fbefb3a0cb2ff5ee5aa425cfe4249f16d6ede7b3ff14
- 92968a2331a02a3128460a64ba16fbf8d3a2fc79ebc8882300015d3ca0e4fb17
Similar to the Mooncoin Theft a year ago, and just as devastating, a gambling website's customers lost a large amount of money. This time, the owner took just as large a hit: all the deposits, plus non-live storage, were stolen. 2900 BTC remains to be refunded to creditors today.[28]
Tony Silk Road Scam Time: 2012-04-20 Victim: Buyers on Silk Road Status: Scammer known to be Silk Road user Tony76 Amount: Estimate 30000 BTC[31] Equivalent in USD: 146944 $ Equivalent in January 2014 BTC: 184 BTC Users of Silk Road, an underground drug market using Bitcoin as the default currency, bought significant quantities of illicit drugs from trusted vendor Tony76. Although Silk Road has an escrow system, trusted vendors are allowed to bypass the system and request that the buyers pay first. On April 20, which is a popular day for drug sales in American culture, Tony76 offered drugs at a significant discount. However, none of the products made it to the customers, revealing the sale as an elaborate sham.
May 2012 Bitcoinica Hack NB: Impacts of this theft may continue to grow pending outcome of liquidation. Time: May 12, 2012, 11:19:00 AM [blockchain time, off by up to three hours] Victim: Bitcoinica, LLC Status:
- Hacker unknown, minimal coins were returned.
- Venture capital group Wendon Group threatened legal action against Bitcoinica Consultancy.
- Receivership in New Zealand ongoing.
Amount:
- Bitcoinica: Exactly 18547.66867623 BTC
- Creditors of Bitcoinica: Pending liquidation
- BitMarket.Eu: About 19980 BTC
Total impact: At least 38527 BTC Equivalent in USD: 191638 $ Equivalent in January 2014 BTC: 241 BTC Chief transaction of interest: 7a22917744aa9ed740faf3068a2f895424ed816ed1a04012b47df7a493f056e8 Zhou Tong, former founder of Bitcoinica, discovered an entry into Bitcoinica's Rackspace server through an excessively privileged compromised email address. This caused the theft of the entire hot wallet, funds stored on-site, as well as the loss of the main database. No backups were kept. Bitcoinica shut down because of this incident. The claims process is still ongoing; however, Bitcoinica is now entering receivership.
On December 21, 2012, it was discovered that BitMarket.eu, a company run by Maciej Trębacz, lost a large portion of customer funds which were stored on Bitcoinica.[32] These customers were reportedly unaware that their funds were stored on Bitcoinica. Return of a portion of these funds is still possible, pending the outcome of liquidation.
Bitcoin Syndicate Theft Time: July 04, 2012, 02:34:19 PM (Mt. Gox time) Victims:
- Bitcoin Syndicate
- Paul Mumby
- Shareholders on GLBSE
Suspect: IP 130.83.54.115 Status: Pending Amount: Exactly 1852.61553553 BTC Equivalent in USD: 14595 $ Equivalent in January 2014 BTC: 18.5 BTC Medium of theft: Mt. Gox Transactions of interest: On Mt. Gox. Withdrawal transaction was 4c61d3639f010e30ad305b294cd128f381f58fc161d0badda1f39807dc2f12f7. A hacker infiltrated the Mt. Gox account used by Bitcoin Syndicate, sold off the USD owned, and withdrew all balances.
July 2012 Bitcoinica Theft Time: 2012-07-13 (UTC) Victims:
- Bitcoinica, LLC
- Creditors of Bitcoinica (former users of Bitcoinica)
Suspects:
Suspect | Accused by | Defended by | Additional evidence | Zhou Tong | AurumXChange Mt. Gox | Tihan Seale | Selling bitcoins after event | Chen Jinghai | Zhou Tong | | | Status: All funds returned Amount: Exactly 40000.00000000 BTC[33] Equivalent in USD: 315133 $ Equivalent in January 2014 BTC: 399 BTC Medium of theft: On MtGox. On July 13, 2012, a thief compromised the Bitcoinica Mt. Gox account. The thief made off with around 30% of Bitcoinica's bitcoin assets, which are likely to cost claimants of Bitcoinica debt. Additionally, 40000 USD was also reported to be stolen. The thief is still unknown at this point, but the theft has supposedly been entirely returned. This theft further complicated the [#=may_2012_bitcoinica_hack]May 2012 Bitcoinica Hack[/iurl].
BTC-E Hack Time:
Event | Time | Commencing | 2012-07-31 00:07 (UTC) | Action taken | 2012-07-31 06:30 (UTC) | Victim: btc-e.com Suspects:
- (unlikely) BTC-E chat user MrWubbles*
* Person has denied committing theft after initially pretending to do it. Evidence supports the faked theft admission as mere trolling.
- (unlikely) BTC-E (accusation of inside job): Little evidence has been provided; as BTC-E reimbursed its customers, the only thing it could gain from faking the theft was PRand faking poor security is usually not considered useful PR.
Status: Pending Amount: Estimate 4500 BTC[34] Equivalent in USD: 35452 $ Equivalent in January 2014 BTC: 44.9 BTC On July 31, 2012, the BTC-E Liberty Reserve API secret key was broken. This key was shorter than it needed to be at only 16 characters long. The attacker initiated many Liberty Reserve deposits and injected large amounts of USD into the system, which were quickly sold for BTC. Not all BTC was withdrawn; official estimates state that the scope was limited to 4500 BTC. Similar to the June 2011 Mt. Gox Incident, the BTC-E market was disturbed during the duration of the hack. The handling of this hack was widely applauded after BTC-E revealed they would cover the losses and revert to a backup made just before the hack.
Kronos Hack Date: August 2012 Suspects: - Alberto Armandi[35]
- bitdaytrade @BitcoinTalk
- bitscalper @BitcoinTalk
- jjfarren @BitcoinTalk
Victim: Kronos.io investors (Brian Cartmell)[36] Status: Legal action possibly pending Medium: Mt. Gox Amount: Estimate 4000 BTC[35] Equivalent in USD: 42859 $ Equivalent in January 2014 BTC: 53.6 BTC Kronos.io, a Bitcoinica-esque startup, was hacked in an event shrouded in mystery even today. Led by Jonathon Ryan Owens, who was simultaneously running other new startups on GLBSE (an upstart Bitcoin stock exchange), Kronos.io hired several well-known Bitcoin personalities to do work with HTML and coding. One of these was Alberto Armandi, who was related to Bitscalper, a scam earlier that year.[36]
Alberto Armandi reportedly hacked into the website he himself helped code. The vulnerability was in the withdrawal script that Alberto coded, reportedly intentionally as a backdoor.[36] Although incredible, Armandi has also released a story denying he hacked the website. Instead, he blamed the theft on Jonathon Ryan Owens intentionally pocketing the majority of the funds with only 1000 BTC being stolen by an unknown hacker.[37]
Bitcoin Savings and Trust Time: 20112012 Victim: Creditors of First Pirate Savings and Trust, later Bitcoin Savings and Trust Status: Trendon Shavers (Perpetrator) caught by SEC[38] Amount: Lower bounds 150649 BTC[38], 193319 BTC[39], 200000 BTC[40]; Estimate 263024 BTC[41]; Upper bound >700467 BTC[42] Equivalent in USD: 2983473 $ Equivalent in January 2014 BTC: 3700 BTC More information on Trendon Shavers default.
Bitfloor Theft Time:
Event | Time | Theft Commences Transaction: #1 | 2012-09-04T03:07:39 | Theft Continues Transaction: #2, #3 | 2012-09-04T03:12:52 | Theft Culminates Transaction: #4, #5 | 2012-09-04T03:43:33 | All times are blockchain time, and have possible error of up to 3 hours. Victims: Bitfloor, creditors Status: Hacker not known, but IP is 178.176.218.157. Some coins repayed to creditors. Amount: Upper bound 24086.17219307 BTC] Equivalent in USD: 273209 $ Equivalent in January 2014 BTC: 339 BTC Transactions of interest:[43]
- 83f3c30dc4fa25afe57b85651b9bbc372e8789d81b08d6966ea81f524e0a02be
- d5d23a05858236c379d2aa30886b97600506933bc46c6f2aab2e05da85e61ad2
- 358c873892016649ace8e9db4c59f98a6ca8165287ac80e80c52e621f5a26e46
- f9d55dc4b8af65e15f856496335a29e2be40f128a7374c75b75529e864579f93
- 42ea472060118ee5aee801cdedbc4a3403f3708a87340660f766e2669f0afeb0
Although the keys to the hot wallet of Bitfloor was secured, an unencrypted backup was mistakenly stored on some of the servers. After a hacker gained entry, most of not only the hot wallet but also the cold wallet was stolen. To this date, none of the coins have been returned by the hacker to Bitfloor. Although Bitfloor briefly shut down after the incident, it has since restarted and has committed to repaying its creditors.[44] Unfortunately, Bitfloor's banks shut down the exchange's operation before all coins could be recouped.
Cdecker Theft Time: September 28, 2012, 07:21:14 PM Victim: Cdecker Status: Thief IP may be 178.140.220.181[45] Amount: Exactly 9222.21195900 BTC Equivalent in USD: 104607 $ Equivalent in January 2014 BTC: 130 BTC Transactions of interest:
- 6f85951bcecbe64999ad192275af087c5be2922ee13937693992c1ddf9ae8ce6
- 8e6a2d0b8132d3d9edc1fcffe1b3079de59c10c67522e2abc51c1d84b260fdac
A supposedly long-time user of Bitcoin found his personal wallet emptied of a significant amount in late September 2012. Because far more severe personal thefts had occurred in the past, the theft went by without much incident.
2012 50BTC Theft Date: 2012-10-13 Victim: 50BTC Mining Pool Status: Unresolved. Transactions of interest:[46]
- 9dfdb24667657365c469ff20568fcc820f6f028a125d9c22dc521ae44dcf7c5e
- bd2ad7b49c22d12cf2f8f12ef601952aed2a96907af4df732156fd90165b5ef5
- d0035ad189634e90239cca82eb53f78e08c0179620b2bd24e2cb291478c7d57a
- a2b642bafea45bc128d81314ef33542bc807811ba066329eaa1306bd62bec075
Amount: Exactly 1173.51659074 BTC Equivalent in USD: 13437 $ Equivalent in January 2014 BTC: 16.7 BTC The 50BTC mining pool suffered a hack of the billing software in late 2012. They were unable to identify the vulnerability. After the incident, 50BTC completely rewrote the billing software.[46]
2012 Trojan Time:
Event | Time | Theft Commences Transaction: #1 | 2012-10-18 22:56:56 | Theft Continues Transaction: #2, #3, #4, #5, #6, #7, #8, #9, #10 | September, October and November 2012 | Mralbi @BitcoinTalk theft Transaction: #11 | 2012-11-16 03:30:13 | Theft Culminates Transaction: #12, #13 | 2012-11-16 03:30:13 | Victim: Various, incl. Mralbi @BitcoinTalk Status: Thief IP may be:
- 97.106.160.84
- 178.177.115.229
Amount:
- Through blockchain: Exactly 3257.00000000 BTC +0.02450000 BTC tx fees
- Through Mt. Gox: Lower Bound 200 BTC
Amount: About 3457 BTC Equivalent in USD: 39146 $ Equivalent in January 2014 BTC: 49.1 BTC Transactions of interest:
- 04e378f81eb620f21927639cd4cda00e0473ca958f4d21f2255f37554b5440fa
- 065e7ff6b1503fc023876ffe930dcd9866531812e40bbda72835f232c2f23910
- 0723b67631588b6d5a4a406a9ef8d431c0d5282c6f1cb308fef57c7503d83158
- 0ae924c33555b294a3f0b256da6a02ab996d30be00eaf184d53281009a3a50d6
- 3f938408deb6d20a74f6256d3ba0217df266450d4c00c40d94df7b840f66db05
- 9766b624e004ad1a9369b1b461d33f57e7dddabb43942d34ac10e912cd9ce36b
- 2db76ebd4b5eecf008334d1bdc1f63f764ca3fb9275557a2a82d52ebf52eea9f
- c041a74fd565c3eb247ff4b1fb6eb0ab9299c3e7d58e5172c28cbe9540858d5a
- 82719bedd0730511385faf68d88b9a03e269a40e3fa5f269efe4a9fc3a821f7f
- 2bc69aa29f56d7051f9cb19bf923c5e2a81879b4f6a3bc849f4166f56d417c2a
- 8d6602b0e8e4479d79e5dab0c35bdb4f7545513cb426411348ec1502413a8f80
- 3a66ebef43041f230e799f1efd3a93e41f875c718da683e236632e13a70cf898
- 0197692748ba894697a0a48fdfdb3e72f3275b079005efad8be062de38b65edf
A trojan horse stole thousands of BTC between September and November of 2012. BitcoinTalk user mralbi was a major victim, losing almost 2600 BTC.[47] The same hacker also stole 200 BTC from Mt. Gox accounts, supposedly with the same trojan which doubled as a keylogger.
|