monero-project / meta

A Meta Repository for General Monero Project Matters
165 stars 71 forks source link

CCS Wallet Incident #916

Open luigi1111 opened 11 months ago

luigi1111 commented 11 months ago

The CCS Wallet was drained of 2,675.73 XMR (the entire balance) on September 1, 2023, just before midnight. A second, hot wallet, used for payments to contributors, is untouched; its balance is ~244 XMR. We have thus far not been able to ascertain the source of the breach.

Timeline

Open questions:

fluffypony commented 11 months ago

Just to add to this, it's entirely possible that it's related to the ongoing attacks that we've seen since April, as they include a variety of compromised keys (including Bitcoin wallet.dats, seeds generated with all manner of hardware and software, Ethereum pre-sale wallets, etc.) and include XMR that's been swept. See tayvano's thread here. That hack recently started seeing some more sweeps happen (and they can tell that it's from the same hack since the surveillance-chain sweeps go to the same cluster of addresses).

It's entirely possible that other wallets are at risk, which is why luigi1111 and binaryfate have taken additional precautions. I no longer have access to any of these wallets (although I do have large corp / treasury wallets on that laptop that pre-date Monero hardware wallet support and remain untouched), but I've taken similar precautions.

fluffypony commented 11 months ago

It's also possible that the attacker isn't aware of what they've stolen, in which case I'd ask them to consider that they have stolen funds that are donated by individuals against specific things that Monero contributors are working on. This attack is unconscionable, as they've taken funds that a contributor might be relying on to pay their rent or buy food. I'd urge them to take action to make this right if they become aware of this😞

detherminal commented 11 months ago

Shit, thats hard. We've stumbled upon one of the few bad things about crypto that it is irreversible. I can't think of anything other than replacing from the general fund. Also we should use open source hardware wallets like MoneroSigner from now on imo.

lazios commented 11 months ago

"Luigi makes payments from the hot wallet and tops it up from the CCS Wallet (via SSH), occasionally as needed." Does this mean that the private keys for the CSS wallet were on an online Ubuntu server? If yes, thats where the compromise happened imo.

johnalanwoods commented 11 months ago

What’s the balance of the general fund, will replenishing the CCS impact protocol development?

jeffro256 commented 11 months ago

Thank you for the transparency and closure about this issue.

shortly after fluffypony's arrest, most of the CCS wallet was swept by Luigi to the hot wallet as a short-term measure pending more information about the nature of the arrest

So to clarify, @fluffypony never had access to the private keys to the hot wallet, but did have the private keys to the main CCS wallet post-arrest?

Would the public be able to get transaction proofs (with addresses) to all nine of those transactions? If the hack was non-targeted, there's a good chance that the receive address gets re-used in someone else's hack, which would help us find the perpetrator.

Going forward, I think that this scenario is an excellent exhibit on why the CCS should use multisig (at least for the main wallet).

serhack commented 11 months ago

So sad to learn about this, please let me know if you need any help for the forensic part.

fluffypony commented 11 months ago

So to clarify, @fluffypony never had access to the private keys to the hot wallet, but did have the private keys to the main CCS wallet post-arrest?

Yes, as well as keys to the Bitcoin donation wallet, previous Monero GF wallet, etc. Post my release I nuked everything that could potentially be problematic as I was unsure as to what might happen next, and didn't want to put anything at risk.

Would the public be able to get transaction proofs (with addresses) to all nine of those transactions? If the hack was non-targeted, there's a good chance that the receive address gets re-used in someone else's hack, which would help us find the perpetrator.

I'm sure @luigi1111 can do that.

Going forward, I think that this scenario is an excellent exhibit on why the CCS should use multisig (at least for the main wallet).

Yes definitely; multisig was not ready for this prior, but now it is.

selsta commented 11 months ago

@johnalanwoods General fund is around 8k.

will replenishing the CCS impact protocol development?

No, the general fund isn't usually used for funding active development but more for emergencies like this and other unexpected expenses.

SamsungGalaxyPlayer commented 11 months ago

picture

There's a clear suspect: https://xmrchain.net/tx/bb77d03cae08942f43cccd759ade505a1c9435470a4a2cabfa5e26d2c93d1a58

ridolfox commented 11 months ago

Just to add to this, it's entirely possible that it's related to the ongoing attacks that we've seen since April, as they include a variety of compromised keys (including Bitcoin wallet.dats, seeds generated with all manner of hardware and software, Ethereum pre-sale wallets, etc.) and include XMR that's been swept. See tayvano's thread here. That hack recently started seeing some more sweeps happen (and they can tell that it's from the same hack since the surveillance-chain sweeps go to the same cluster of addresses).

It's entirely possible that other wallets are at risk, which is why luigi1111 and binaryfate have taken additional precautions. I no longer have access to any of these wallets (although I do have large corp / treasury wallets on that laptop that pre-date Monero hardware wallet support and remain untouched), but I've taken similar precautions.

The hacks you mentioned @fluffypony were determined to be related to LastPass. This seems to be something different...

fluffypony commented 11 months ago

The hacks you mentioned @fluffypony were determined to be related to LastPass. This seems to be something different...

A large number of them were, but there are a whole screed of sweeps from users that have never even downloaded LastPass.

scottAnselmo commented 11 months ago

"The CCS Wallet was drained of 2,675.73 XMR (the entire balance) on September 1, 2023, just before midnight." Is this midnight UTC or another timezone? If UTC we can assign it low probability to be the same attacker referenced in tayvano's thread:

Primary theft txns are almost always between 10am–4pm UTC

I'm guessing Core is already looking into hiring professional digital forensics specialists, but this could help with prioritizing what data to collect now that might still be around: https://owasp.org/www-pdf-archive//NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf

jeffro256 commented 11 months ago

Maybe I'm not understanding correctly, but aren't both of @luigi1111 wallets, Ubuntu and Windows, "hot" wallets? Both reside on machines connected to the internet with no hardware devices. Both had their respective spendkeys on them, yeah?

Luigi makes payments from the hot wallet and tops it up from the CCS Wallet (via SSH), occasionally as needed

How was this performed? Did the Windows computer SSH into the Ubuntu computer, or vice versa?

Was the node that the Ubuntu wallet ran on a pruned node or full node?

hinto-janai commented 11 months ago

CCS Wallet Opsec 2.0


The offline computer could be a scrappy $200 notebook, what's important is that it is offline forever.

There is a burden when moving funds like this, but then again - this is a large amount of community funds.

Having more "hot" buffers would spread out risk as well, and would speed up the payout latency for contributors, e.g, @plowsof could be given enough funds to pay out soon-to-be-finished CCS's (assuming he doesn't vanish)

Core team is in favor of covering existing liabilities from the General Fund

Now that this is disclosed, current contributors who have been waiting for payment should be paid ASAP :)

rehrar commented 11 months ago

Now that this is disclosed, current contributors who have been waiting for payment should be paid ASAP :)

Core and their helpers have often been trying to pay things out over the years. But a combination of some people being unreachable, refusing payment, or other such circumstances means that funds often sit there. Many times for years. It may be wise to institute a form of expiration policy where unclaimed funds (x months or years after funding/project completion) go into a special "Fund other CCS projects" wallet or something. All of this Monero sitting there years after funding are a liability.

luigi1111 commented 11 months ago

Maybe I'm not understanding correctly, but aren't both of @luigi1111 wallets, Ubuntu and Windows, "hot" wallets? Both reside on machines connected to the internet with no hardware devices. Both had their respective spendkeys on them, yeah?

Luigi makes payments from the hot wallet and tops it up from the CCS Wallet (via SSH), occasionally as needed

How was this performed? Did the Windows computer SSH into the Ubuntu computer, or vice versa?

Was the node that the Ubuntu wallet ran on a pruned node or full node?

Windows -> Ubuntu, once every 3 months or so. Full node.

marcovelon commented 11 months ago

Windows -> Ubuntu, once every 3 months or so. Full node.

"Luigi makes payments from the hot wallet and tops it up from the CCS Wallet (via SSH), occasionally as needed." Does this mean that the private keys for the CSS wallet were on an online Ubuntu server? If yes, thats where the compromise happened imo.

I am of the same opinion. All Tayvano's "OG" friends were also Windows users and considering the amount of well done and undetectable malware existing for that OS, I wouldn't be surprised if Luigi's Windows machine was already part of some undetected botnet and its operators performed this attack via SSH session details on that machine (by either stealing the SSH key or live using trojan's remote desktop control capability while the victim was unaware). Compromised developers Windows machines resulting into big corporate breaches is not something uncommon.

A first step to investigate this is to log that machine's network traffic on the router that connects it to the Internet. A log time should be at least 48 hours (but more = better) with any software using network switched off to maximize the log's quality by reducing the noise to the possible minimum. Backdoors existing today are capable of being very low profile in terms of networking and detecting them isn't easy, therefore it will require some time and patience.

This is the only possible realistic attack vector in this case, given that the timeline provided in the OP doesn't omit some more important information.

P.S. beware that chances to discover the malware are 50/50, given that the attacker may track all the public communications related to this event including reading this thread, who could decide to detach/deactivate the backdoor to clear the evidence and avoid its disclosure. So consider making a full disk dump of that machine as well.

P.P.S. stop using Windows for such projects.

SamsungGalaxyPlayer commented 11 months ago

picture

The attacker likely consolidated the funds again in these two transactions. Exchanges and services should check to see if they received these XMR deposits.

https://xmrchain.net/tx/2c5b45bf398dcae482019a46fb2d06d334bf4260484dc4857fc35db3689ad5ec

https://xmrchain.net/tx/06550272cdfa1eea98d288b2d57c272b5c52a2b195b4f808c8c03422a58ca47b

MrCyjaneK commented 11 months ago

I think that nobody asked that before, @luigi1111 I have few questions about the Ubuntu server

p.s. @SamsungGalaxyPlayer are you tracking monero 😕?

luigi1111 commented 11 months ago

I think that nobody asked that before, @luigi1111 I have few questions about the Ubuntu server

  • Was it running at your place (i.e. phisical device you had access to that was being turned on when needed (especially: was offline during the 'Incident'))
  • If not, was it a dedicated cloud server or a KVM/OpenVZ/other VPS (if possible, tell us who was the cloud provider)?
  • Which version of Ubuntu was it running at the time of Incident?
  • Was the Ubuntu server accessed via SSH password authentication or key?
  • Lastly, not a question - but if you have logs of any kinds (maybe logs in backups), try securing them, if it was a cloud server download oldest possible backup(s), and grab copy of all server logs.

p.s. @SamsungGalaxyPlayer are you tracking monero 😕?

tuxpizza commented 11 months ago

P.P.S. stop using Windows for such projects.

If you are truly concerned about malware, simply switching to Linux isn't a great answer. Default Linux installations are not that great for security and not very hardened. You need a hardened system, preferably an immutable OS that has the root partition as read-only, IE Fedora Silverblue or any other OSTree based systems. Use https://cisofy.com/lynis/ to see any potential unnecessary security issues and things that weren't being used that can be turned off. Setup automatic updates. Only use Wayland, as X11 is easy to keylog. Use keys for SSH, not passwords. Or better yet SSH turned off. If you need to access it do it physically.

Same thing goes for the CCS node/wallet server. Using UEFI Secure Boot, LUKS encrypted main, root, and GRUB partition. Wanna get crazy you can do coreboot with heads on some specific systems that support it. Don't use LTS kernels, use the latest one with grsecurity patches. Just suggestions.

Also a given, these two devices should be VLAN'd from the rest of the network if not already.

@hinto-janai 's model would already greatly improve what already exists, offline signing would take so many potential attack vectors away.

Also secure the network if not already. Run an OPNSense firewall to VLAN and make sure no unnecessary ports are open. Use an OpenWRT router if you need wireless. Countless shitty consumer routers don't get updated ever, and many of them have severe vulnerabilities that don't get patched for a really long time.

marcovelon commented 11 months ago

P.P.S. stop using Windows for such projects.

If you are truly concerned about malware, simply switching to Linux isn't a great answer. Default Linux installations are not that great for security and not very hardened.

I didn't say one should use a default Linux installation. What you said should be already obvious to people with such responsibilities. What's surprising is that this is being explained to people from Monero team.

MrCyjaneK commented 11 months ago

I didn't say one should use a default Linux installation. What you said should be already obvious to people with such responsibility.

Fluffy's setup was much better..

@luigi1111

It was running at my place. Was it exposed to the public internet in any way, other than your laptop or only available via LAN?

I think that this may be the most likely cause of the incident, I doubt someone 'guessed' the seed right.

marcovelon commented 11 months ago

Fluffy's setup was much better..

Yeah it corresponds to the industry standard where the threat agent is LE.

tuxpizza commented 11 months ago

I didn't say one should use a default Linux installation. What you said should be already obvious to people with such responsibilities.

Given that Windows was being used these things probably aren't obvious. Most people are not very knowledgeable on the inherent security issues with desktop operating systems, or basic hardening.

tayvano commented 11 months ago

I'm not 100% caught up on this thread yet (just getting back home) but here's some more specific details on the threat actors ive been chasing for a good while now:

typically operate 1200 utc - 2300 utc, though all hours have been observed. least amt of activity 300-1000 utc

observations we have on them for the time period mentioneed by op:

2023-Aug-30 21:50 2023-Aug-31 13:09 2023-Aug-31 18:29 2023-Aug-31 18:31 2023-Aug-31 20:13 2023-Sep-03 12:31 2023-Sep-03 12:32 2023-Sep-03 12:35

for those above timestamps, all activity was via

2a00:1650:0:3:45::1

2001:ac8:23:3c:2d4::1

Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36

These are either HideMe VPN or residential proxies (5socks etc), as is usual for these actors.

Victims have all sorts of devices. The only real thruline is the age of keys (created prior to 2022, some keys date back as far as 2012) and everyone we have talked to has used lastpass, most have confirmed the specific keys/seeds that were compromised were in lastpass, usually a secure note, at some point. most are longtime lastpass users but a few only used last past for a short period of time. those users confirmed the specific compromised keys were in lastpass.

fwiw, these actors even push stolen XMR to BTC—we have observed them consolidating a victim's eth, btc, xmr to a btc address before pushing to wasabi/sinbad/cryptomixer/coinomize/etc. they use instaswappers to do so e.g. fixedfloat, simpleswap, sideshift, etc. The size of this theft should make the funds easily findable in the outgoing transactions from the hot wallets of those instaswappers on BTC if it is in fact these same threat actors.

The first thing I would ask is if anyone who's ever had access to the keys that were compromised here has had other wallets drained in the last ~year. Even if the amt stolen from those wallets was small / dust. That will help determine source of compromise faster than anything else tbh.

BawdyAnarchist commented 11 months ago

I can't understand why on Earth you would use less secure system (the Windows hot wallet) to SSH into the what is supposed to be the more secure system (Ubuntu). With a password no less.

Neither do I understand why you would choose Windows or Ubuntu for either operation in the first place. If you're not an expert at sysadmin and security, then you should be using Qubes for this amount of funds, and/or offline key storage.

elibroftw commented 11 months ago

I am of the same opinion. All Tayvano's "OG" friends were also Windows users

@marcovelon You know, I'd really like to see some citations in a thread about cybersecurity when even Tayvano said all sorts of devices.

My questions for Luigi and Fluffy Pony are:

luigi1111 commented 11 months ago

I am of the same opinion. All Tayvano's "OG" friends were also Windows users

@marcovelon You know, I'd really like to see some citations in a thread about cybersecurity when even Tayvano said all sorts of devices.

My questions for Luigi and Fluffy Pony are:

  • Where all has the CCS seed been stored (device, app, file format)? e.g. Windows/ubuntu, Password managers, text files, etc.

    • Also, If the Ubuntu server storage got shot one day, how would you restore the CCS wallet?

Seed was only on paper on my end.

Monero-HackerIndustrial commented 11 months ago

Windows -> Ubuntu, once every 3 months or so. Full node. I think the most plausible route for an attacker is to compromise the windows machine then move laterally to the ubuntu host. With an installed agent on windows an attacker can proxy the traffic and piggy back an existing ssh session or just open one in the background using the compromised password. (You don't even need a kelogger but should be able to dump creds from mem). Once on the host either steal the keys or install an agent on the ubuntu host since it has internet connectivity. (Once keys are stolen the agent is just there for persistence)

P.S. beware that chances to discover the malware are 50/50, given that the attacker may track all the public communications related to this event including reading this thread, who could decide to detach/deactivate the backdoor to clear the evidence and avoid its disclosure. So consider making a full disk dump of that machine as well.

There is in memory only malware for windows too. I suggest DD the Ubuntu host and also imaging the windows one if possible. You can dump the memory on it but that was a long time ago so the best bet is on some persistence.

For the windows host I would hope to examine what network traffic it is connecting to. With remote agents you usually want to make them look like http traffic. So if all programs are down examine what connections are being made to ips or domain names on that box. Keep in mind attackers can domain front trusted cloud domains or use known services such as gsuite, dropbox, slack etc for evading traffic.

I do have some other questions for the setup:

@tuxpizza has some good recommendations. The network telemetry at a router level would have helped to detect intrusion and the completely airgapped model would have really made it harder for an attacker to steal funds. I think that using a more "paranoid" model should be followed moving forward. There are a number of very sophisticated threat actors who target crypto teams/groups. They have really good malware and you have to assume they have some browser based 0days at their disposal.

I really doubt it was some compromise at the initial setup. Many of the crypto focused threat groups target specific high value wallets. There are also the existing botnet operators who can run modules to pillage for crypto/find juicy targets.

Monero-HackerIndustrial commented 11 months ago

@tayvano The actor that you have been following was the same one as the atomic wallet hack right? I know there was a lot more publicity on the eth wallets being drained and there are some reports of btc and other coins, but how common was the compromise of xmr wallets? (From my understanding most of xmr stolen by that group was from atomic wallet).

I don't know if that actor had any examples of any lateral movement? They appeared to mostly be a group who consolidates stolen keys and is just systematically draining them during those operating times. I don't want to count it out but I don't think it would be the same actor. Unless that actor has moved on to attacking xmr wallets. Which would surprise me in this scenario since while it is a big amount is not a huge wallet compared to other targets in the space.

Monero-HackerIndustrial commented 11 months ago

One last thought. Is there a on going IR process being followed? If you need any help with some basic forensics (outside of the memory dumps) I should be able to help. I am usually on the offensive but have dealt with enough defensive teams to be bale to walk through most of the process. I really think the windows box for sure got popped with malware and the ubuntu box might have some too.

BastardiNonCarborundum commented 11 months ago

Events like this never exist in a vacuum. Context is everything. But what is the context?

1 - Cui bono? FluffyPony and luigi1111 will be watched for the rest of their lives by people looking for evidence of extraordinary riches (the impulse to spend rises exponentially as one gets older, except for Nakamoto). I am personally convinced that neither of them are that stupid or ethically compromised. On the other hand, there are two generic parties that stand to gain a lot from a Monero breach - especially a breach of the "heart" of Monero (which shouldn't exist IMO, for this and other reasons) - ie, large corporate or state actors. Which coin is the only one with a public reward by the IRS? That should be your primary focus.

2 - Some have talked about signing offline. They are correct. Some have admonished those same people about the OS and even the physical platform they're signing on. They are also correct. One espoused confidence in UEFI. The first thing I did when I bought an ultrabook with cash at my local retailer in 2013 was disable UEFI. The reason for that is beyond the scope of this post, just do a search.

3 - Paper/stainless steel passwords are ok up to a point, but they're physical (and all that it connotes). Rote learning a 50+ character key, signed off line, is not that difficult. I guess it depends on how serious one takes their responsibility. And of course there is the physical setup - use a TAILS instance (the machine doesn't matter if you have UEFI disabled, at least as far as I know), and sign transactions with your key from memory - the same way Edward Snowden did - with his jacket covering his head and computer. He was NSA. If you think that is comical, you don't belong here.

4 - It's just money. Relax.

Final-Phoenix commented 11 months ago

CCS Wallet Opsec 2.0

  • Seed should be generated on the "offline" device
  • Only the wallets view key is given to "hot" devices - such that they can generate & broadcast transactions but not sign them
  • Wallets are password-protected and/or machines are at-rest encrypted for physical security
  • Seed is shared only in encrypted form, and this wallet setup must replicated by whomever holds a copy of the spend key
  • Key images and outputs are transferred in the same way as transactions

The offline computer could be a scrappy $200 notebook, what's important is that it is offline forever.

There is a burden when moving funds like this, but then again - this is a large amount of community funds.

Having more "hot" buffers would spread out risk as well, and would speed up the payout latency for contributors, e.g, @plowsof could be given enough funds to pay out soon-to-be-finished CCS's (assuming he doesn't vanish)

Core team is in favor of covering existing liabilities from the General Fund

Now that this is disclosed, current contributors who have been waiting for payment should be paid ASAP :)

Definitely should have always been doing this in the first place, but it still wouldn't change anything if it was an inside job.

We should figure out a way to decentralize the process and for the community to directly fund these projects, or at the very least have some sort of multisig setup.

erciccione commented 11 months ago

I see there is a lot of speculation going on, but as long as there are no more details, better wait until we know more. My thoughts on the first two of luigi's questions:

How do we achieve CCS continuity for existing contributors? Core team is in favour of covering existing liabilities from the General Fund.

The general fund should be definitely used to cover the payment of ongoing ccs and already approved ccs. This is the "rainy day" kind of situation the general fund exist for.

How do we structure the CCS going forward?

Every wallet with substantial amount of money managed by the core team should be a multisig wallet. The possibility for single individuals to make transactions from such big wallet will always be a huge vulnerability and in case of breaches, like what we are seeing now, it's inevitable that some in the community will be suspicious of the core team members who had the possibility to transact from that wallet.

This situation seriously impacts short and long term trust in the Monero project and the core team who stewards it, especially since there seems to have been big oversights in the way funds are stored and secured. The sooner things are clarified the better.

We can take advantage of this situation to reconsider the way funds are managed inside the Monero project, which is based on almost complete trust in the core team.

So i throw there another question i think it's very important to answer to:

ghost commented 11 months ago

@SamsungGalaxyPlayer How you were able to track monero?

r4v3r23 commented 11 months ago

CCS Wallet Opsec 2.0

  • Seed should be generated on the "offline" device
  • Only the wallets view key is given to "hot" devices - such that they can generate & broadcast transactions but not sign them
  • Wallets are password-protected and/or machines are at-rest encrypted for physical security
  • Seed is shared only in encrypted form, and this wallet setup must replicated by whomever holds a copy of the spend key
  • Key images and outputs are transferred in the same way as transactions

The offline computer could be a scrappy $200 notebook, what's important is that it is offline forever.

There is a burden when moving funds like this, but then again - this is a large amount of community funds.

Having more "hot" buffers would spread out risk as well, and would speed up the payout latency for contributors, e.g, @plowsof could be given enough funds to pay out soon-to-be-finished CCS's (assuming he doesn't vanish)

Core team is in favor of covering existing liabilities from the General Fund

Now that this is disclosed, current contributors who have been waiting for payment should be paid ASAP :)

using seed encryption (offset) & a cold storage setup with airgapped transactions would have prevented all of this (assuming it was a hack)

luckily now we have wallets like ANONERO and (soon) Feather Wallet that will make securing such a setup much easier next time

TheFuzzStone commented 11 months ago
  • How can we improve the way funds are managed so that trust in the "treasurers" is minimized?

Multisig.


Maybe someone will not like this level of nerdiness, but I see the situation this way.

A multisig wallet is created with for example with 5 cosigners, and 2 cosigners are required to spend.

The number of cosigners - let the Monero community decide, as well as the Core team amongst themselves, as different people are online with different frequency, and if you reduce the number of cosigners too much, you may end up with a situation where the right number of cosigners are unavailable to spend funds from the wallet.

Each of the 5 cosigners must have a GPG key, and sign the necessary public keys from the Multisig wallet (and upload them to Github/-Lab) for future verification of which key was involved in each spend from the main wallet.

All cosigners (in this example there are 5 of them) should be able to communicate with each other, and definitely not through a proprietary crap like Wire App, where half of the mnemonic phrase has already been covered (I recommend you NOT to use this mnemonic phrase anymore). Create a chat room in SimpleX.chat for only number-of-cosigners cosigners.

When the need to spend money comes, then 1 of 5 cosigners writes in the chat: "We need to send n XMR for such and such expenses", let's say cosigner_2 will be the initiator (simply because he is more often online than the others, and more monitors the situation within the Monero community), and cosigner_4 responds to him in this chat, that he is online also, and is ready to sign this spend from his side.

Let me remind you that all this happens in private chat only for the cosigners of this wallet.

Other cosigners (cosigner_1, cosigner_3, cosigner_5) see that cosigner_2 and cosigner_4 have everything under control, and if they are satisfied with everything, they can simply ignore and cosigner_2 and cosigner_4 will send the right amount of XMR to the right place, and due to the fact that the necessary public keys were signed with their GPG-keys and posted publicly - anyone can check who exactly from cosigners took part in the spending of each transaction from this Multisig wallet.

This is just my idea. It is not necessary to take exactly 5 cosigners and it is not necessary to create a wallet that requires only 2 signatures. There needs to be a balance between convenience/efficiency and security, because in the end it can end badly.

If you want "democracy"? Create a Multisig wallet with 10 cosigners and where you need 6 signatures to spend. Only question is, how efficient will it be?

spirobel commented 11 months ago

lets shut the CCS down and support developers directly. You guys have failed. (Or you stole the money. There is no way to tell.)

shortwavesurfer2009 commented 11 months ago

I don't actually feel like they stole the money. If they had wanted to do that, there has been plenty of opportunity before now, and that is a lot of Monero that they could have stolen at any time.

Sent from Proton Mail mobile

-------- Original Message -------- On Nov 3, 2023, 9:14 AM, spirobel wrote:

lets shut the CCS down and support developers directly. You guys have failed. (Or you stole the money. There is no way to tell.)

— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you are subscribed to this thread.Message ID: @.***>

spirobel commented 11 months ago

I don't actually feel like they stole the money.

There is no way to tell. This system is extremely stupid. Instead of building a relationship of mutual trust between developers and donors, we have a middle man that can just take the money or lose it because of incompetence.

Also we need to bow to this middle man if we want to make a living. Because this middle man can drag out payments or refuse to merge requests for funding.

tayvano commented 11 months ago

@Monero-HackerIndustrial --

The actor that you have been following was the same one as the atomic wallet hack right?

No, the actors I'm following are Russian-speaking while Atomic Wallet was hacked by Lazarus aka North Korean state-sponsored actors. Based on the subsequent DPRK hacks like AlphaPo, Coinspaid, Coinex, and Stake the Atomic Wallet hack is likely is from some variation of their Operation Dreamjob campaign. Basically they offer mid-tier devops guys who have too much server access a nice, cushy job and drop a malicious PDF or ZIP or something as part of the job application process and escalate from there.

That said, there are major overlaps with the crew that was responsible for 3CX and JumpCloud supply chain attacks so it may be that Atomic Wallet's compromise was more sophisticated than a mal pdf.

While DPRK has sophisticated malware across Mac, Windows, Linux, they rely heavily on social engineering to make initial access and escalate privs. They trick you into installing something that ultimately grants them access. Their turnaround time is also pretty dang fast and, as such, even less technically adept victims are usually pretty quick to determine what message / email was the source of compromise once they've been hit (e.g. a malicious email was received on Oct 26 by a victim, their wallets were drained on Oct 30).

If DPRK is responsible for this attack, which is possible but I think unlikely, it's more likely to be from one of campaigns that target security researchers, use Signal/Wire instead of email/Slack, and take advantage of npm/PyPI packages rather than ZIPs/PDFs.

how common was the compromise of xmr wallets?

The distribution of coins stolen appears similar to the distribution of victim's devices is similar to the distribution of wallets used to generate the compromised keys: it reflects the coins/devices/wallets this specific demographic of people used/held, not what the threat actor targets/prefers. XMR is not the most common coin but its also not rare by any stretch. There have been more XMR thefts than DOGE thefts, for example, lol.

The thing that stands out to me about this hack is the timeline. It appears we're talking about a generally cold wallet that was not accessed or sent from for a decent period of time prior to the theft. In my opinion, it's more likely that this theft was executed by my russian-speaking motherfuckers than by DPRK, but, tbh, it's even more likely to be an individual or group more similar to the one that got Luke back in December.

@SamsungGalaxyPlayer -- I've pinged my contacts to see if anyone has a deposit for those consolidations. Thanks for dropping those.

@ everyone insinuating theft or inside job here -- stop being stupid. your anti-social pathologies are unhelpful and harmful to the situation at hand and the ecosystem in general.

ghost commented 11 months ago

It is very ironic that when the wallet of Monero is being hacked devs would trace the hacker's transaction. I think this is a serious issue and could damage Monero's credibility as a privacy coin.

Whether or not hacker is being caught, it will create more damage to the coin for exposing traceability.

@tayvano This is much, much worse than being speculated for inside job. How the earth that the privacy coin could be traced? We should already assume that the ecosystem being killed because of this.

intr-cx commented 11 months ago

@kaliubuntu0206

It is very ironic that when the wallet of Monero is being hacked devs would trace the hacker's transaction.

The only reason they can do this is because they still have the private keys to the wallet.

ghost commented 11 months ago

@intr-cx I don't think so, Like what the consolidation means, hacker already drained the wallet and tried to consolidate it to other wallet which shouldn't be traced at this point.

intr-cx commented 11 months ago

@kaliubuntu0206 if you actually look through the chatlogs and the kind of 'tracking' they do, it's primarily probabilistic searches using Pokkst's decoy scanner and some clever guesswork based on some highly unlikely statistics about the transactions. After this they're probably going to contact some CEXes with big puppy eyes about transactions with similar amounts.

Regarding the CCS: Whether this happened out of malice, incompetence, or something beyond their control, it clearly demonstrates that CCS needs a complete reform in the very least. Dropping CCS altogether for a system where no single entity has the final say is even better.

tayvano commented 11 months ago

@tayvano This is much, much worse than being speculated for inside job. How the earth that the privacy coin could be traced? We should already assume that the ecosystem being killed because of this.

LOL honey don't you dare tell me that talking about the well-known and well-documented ways in which monero can be traced and the multitude of ways monero users' privacy can be broken is more harmful than 1) the well-known and well-documented ways in which monero can be traced 2) the multitude of ways monero users' privacy can be broken 3) the theft from good-faith builders who have long served the monero ecosystem.

Like, what, is your plan to simply pretend that monero is always untraceable? Because that doesn't make monero untraceable. In fact, that's what leads to people getting fucked because they made bad assumptions based on incomplete information perpetuated by ignorant people like you.

It's quite easy to watch batches of Monero move through the network, especially given a starting point and a narrow time frame. Monero has more fingerprints than most every other chain which is only amplified by the fact everyone is running their own nodes. Further, given the general lack of liquidity on every network rn, anyone with eyeballs can easily find the $200k output for a $200k input even when the threat actor is moving ETH -> BTC or BTC -> ETH via one of the most liquid centralized exchanges. Given that a far smaller subset of centralized exchanges support Monero, the fact the there are no decentralized bridges, the fact we're talking about a sum that's far more than $200k, and the fact the hacker has undoubtedly moved to Bitcoin as that is where they can actually get value for their coins (and actually hide in mixers with more liquidity than the monero network on the whole), its a couple hours of manual work to find the output txns to BTC, and less than an hour if you get lucky or have the ability to filter down the withdrawals from multiple CEX hot wallets quickly.

Whether or not the output will be found in this case depends exclusively on whether or not anyone is sufficiently motivated to find said output. As is always the case. Contrary to popular belief by the paranoid minds that make up the monero ecosystem, most transactions aren't traced because no one gives any fucks about your transactions lol.

If you don't want the above to be true, then you best go understand how Monero is traced and then take steps to make it less traceable and especially educate yourself and other individuals on steps they can take to make their specific movements harder to trace. That is how you make Monero more private—not by lying to people like iTs sO uNtRaCeAbLe. 🤦‍♀️

jeffro256 commented 11 months ago

Monero has more fingerprints than most every other chain which is only amplified by the fact everyone is running their own nodes.

Would you care to expand on this point, please?

TheFuzzStone commented 11 months ago

is your plan to simply pretend that monero is always untraceable?

Monero is one of the tools to keep your financial privacy. That doesn't mean you can't shoot yourself in the foot.

Monero has more fingerprints than most every other chain which is only amplified by the fact everyone is running their own nodes. Further, given the general lack of liquidity on every network rn, anyone with eyeballs can easily find the $200k output for a $200k input even when the threat actor is moving ETH -> BTC or BTC -> ETH via one of the most liquid centralized exchanges. Given that a far smaller subset of centralized exchanges support Monero, the fact the there are no decentralized bridges, the fact we're talking about a sum that's far more than $200k, and the fact the hacker has undoubtedly moved to Bitcoin as that is where they can actually get value for their coins (and actually hide in mixers with more liquidity than the monero network on the whole), its a couple hours of manual work to find the output txns to BTC, and less than an hour if you get lucky or have the ability to filter down the withdrawals from multiple CEX hot wallets quickly.

Wow, that's how trackable XMR turns out to be, even better than the mixers in BTC. That's fantastic. Then you should think about writing software to track XMR and sell it to government agencies.

BTW, 200k, 500k, even a few million dollars in XMR, on the OTC market is just a drop in the ocean, which can be turned into cash at a faster than getting 10 confirmations on the BTC network.

Whether or not the output will be found in this case depends exclusively on whether or not anyone is sufficiently motivated to find said output.

And if it doesn't, it's only because no one is motivated. Uh-huh. I see. And it's not because the person who stole the XMR knows how to get away with it. Only motivation is the factor here.

As is always the case. Contrary to popular belief by the paranoid minds that make up the monero ecosystem, most transactions aren't traced because no one gives any fucks about your transactions lol.

Let's write it down, if someone needs privacy, they should go to fully open blockchains like BTC or ETH, because there is more liquidity there.


I didn't come to fight with you, I just didn't like the way you responded above.