Advertisement
Guest User

Untitled

a guest
Aug 4th, 2011
304
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.14 KB | None | 0 0
  1. -----BEGIN PGP SIGNED MESSAGE-----
  2. Hash: SHA1
  3.  
  4. From the desk of Tom Williams, operator of MyBitcoin.com
  5.  
  6. For immediate release.
  7.  
  8. There are a lot of unanswered questions floating around on the Bitcoin
  9. forum and other places about the recent Mtgox password leak, and theft
  10. from the MyBitcoin system.
  11.  
  12. I will attempt to answer as many of the questions and concerns as best
  13. as I can in order to silence the rumor-mill once and for all.
  14.  
  15. As many of you already know, Mtgox was hacked and its password file was
  16. leaked. As soon as we heard about the leak we were closely monitoring
  17. the system for abnormal activity, and we didn't see any.
  18.  
  19. At first glance, we didn't see any hard evidence that a password leak
  20. had even occurred. There was just a lot of speculation to an SQL
  21. injection vulnerability in Mtgox's site. A few clients of ours had
  22. informed us of the forum threads, and we watched them carefully.
  23.  
  24. The following morning a client of ours sent us the download link to the
  25. leaked Mtgox password file. We prompty downloaded the file, put up a
  26. warning on the main page, and disabled the login.
  27.  
  28. We attempted to line up usernames from the leak, and we found a lot of
  29. matching ones. We started locking down all of those accounts using a
  30. script that we had to have written at a moment's notice. It was during
  31. this time that we noticed a flurry of spends happening. Yes, even with
  32. the site disabled.
  33.  
  34. The attacker had active sessions open to the site. We quickly flushed
  35. them and the spends stopped abruptly. We disabled the SCI, all payment
  36. forwarding, and all receipt URL traffic on all of the usernames in the
  37. Mtgox leak.
  38.  
  39. We proceeded to change the password on every account where the username
  40. matched our system's database. PGP-signed emails went out to all of the
  41. accounts that we changed the password on. If an account didn't have an
  42. email address or had already been compromised we put up a bulletin.
  43. (Email addresses were mandatory when we opened our service initially,
  44. but people complained that it wasn't truly anonymous so we made them
  45. optional. Unfortunately this makes contacting a security-compromised
  46. customer impossible.)
  47.  
  48. An investigation was conducted at that time, and we determined that the
  49. attacker had opened up a session to each active user/password pair ahead
  50. of time, solved the captcha, and used some sort of bot to maintain a
  51. connection so our system wouldn't timeout on the session. It was likely
  52. his intent to gain access to more accounts than he did, but as soon as
  53. he noticed that we had changed the main page of the site he sprung into
  54. action by sending a flurry of spends.
  55.  
  56. (Before you ask: no, we don't limit logins per IP address. We can't. We
  57. have a lot of users that come in from Tor and I2P that all appear to
  58. share the same source IP address.)
  59.  
  60. We've concluded that around 1% of the users on the leaked Mtgox password
  61. file had their Bitcoins stolen on MyBitcoin. It is unfortunate, and a
  62. horrible experience for the Bitcoin community in general.
  63.  
  64. The IP address that the attacker used was a Tor exit node and the spends
  65. were to an address that is outside of our system.
  66.  
  67. Now to address the rumors:
  68.  
  69. No, our database wasn't compromised. We had a 3rd party company audit
  70. our site for SQL injection attacks and we passed. (We did, however, have
  71. one XSS hole in the address book page last month that would allow an
  72. attacker to insert fake entries into a customer's address book. It was
  73. promptly fixed and offending address book entries were purged. Not a
  74. single customer had spent to the fake address book entries.) Every line
  75. of code was audited last month. Literally line by line audited by
  76. professionals, and it was deemed safe.
  77.  
  78. No, this site isn't being ran by some amateur that just learned how to
  79. program computers. It was created by seasoned programmers that
  80. understand security.
  81.  
  82. Yes, we use password encryption. We are currently using SHA-256, but
  83. since the recent Mtgox hack we will be upgrading that to something
  84. stronger. It's surprising how many sites still use MD5, even though it
  85. was broken years ago. It is my personal opinion that MD5 be deprecated
  86. from modern operating systems.
  87.  
  88. We also use whole-disk level encryption on every single one of our
  89. servers. When you fail a disk in a NOC and a level 1 technician replaces
  90. it does he wipe the disk before the RMA/tossing it in the garbage? Not
  91. usually! We know these mistakes happen, so we take precautions. Any and
  92. all servers with an IP KVM on them are ran in secure console mode. The
  93. root passwords are required even for single user mode. All disk keys are
  94. held off-site and were never generated anywhere near the internet. All
  95. server passwords are unique per server and per user, of course. Only two
  96. technicians have access to the secure servers. This access is over a VPN
  97. and we only use secured workstations running Linux and BSD to access
  98. them.
  99.  
  100. We use BSD servers with MAC, immutable flags, jails, PAX, SSP,
  101. randomized mmap, secure level, a WAF, a DDoS mitigation and alert system
  102. - -- the works. Like I said earlier. We are not amateurs. In fact,
  103. combined we have over 30 years of experience in the payment
  104. processing (credit card arena) industry.
  105.  
  106. A large amount of the Bitcoin holding is in cold (offline) storage. We
  107. only have a percentage of the holding available hot. This is done for
  108. obvious reasons.
  109.  
  110. Going forward we are implementing a 2-factor login system,
  111. user-configurable spend limits, better session token tumbling, and a
  112. bunch of new SCI features.
  113.  
  114. Wishing the Bitcoin community all the best and a swift recovery, and
  115. sincerely yours,
  116.  
  117.  
  118. Tom Williams
  119.  
  120. -----BEGIN PGP SIGNATURE-----
  121. Version: GnuPG/MBC v1.0
  122.  
  123. iQEcBAEBAgAGBQJOAki5AAoJEJ+5g06lAnqF3tcH/0QNKf7aBEg08vML9MCkwTjF
  124. VCoTAPzVaVsdbZOqiRwE2/6420tcFZrsWTXYZYbjXckEiYrl7/DQ2XsLyhk4W567
  125. T1sOCmpH99Z2/VAvTfAd5obRTEGpMQ0SLIrfznyc8MmG4C1GvtVUr4jM79asPmRY
  126. jsIn7v53o9Ra1sN3QcvMskRUU1JmqfqU6MlJrYwXrtc/P9Tjm7D3AtsjfvJRX12Z
  127. 9g5y1N+zRGVpp7OK35VFnfmIKtOOtb3IMgG5EhiUllsoXKfz1eE08v4f4d0aQstL
  128. +HGMi3PktL1HBpIRni2n4MAaIXq/EyzxDSzkSHp6v032H70c1kkUibL//QNxQuM=
  129. =VaXC
  130. -----END PGP SIGNATURE-----
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement