Jump to content

Silkjaer

Member
  • Content Count

    232
  • Joined

  • Last visited

About Silkjaer

  • Rank
    Regular

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Not sending funds much around, changing accounts quite often etc. So only slight changes in how they operate.
  2. We've been contacted by a victim of June 27, so while we thought that the perpetrators were done this was a cue to look into movements to see if there were other thefts we didn't know about. Perpetrators have changed tactics and we have been able to identify several thefts, the latest being July 7, and the stolen amount is now close to 26M.
  3. Likely only the secret key is stored in encrypted form, but looking at session data also “personal identifiable information” such as email addresses, is stored and accessible with the API.
  4. Total amount 15 REP – looks like xrpcharts is confused about the USD value of REP In other words, they are payments of REP IOU's issued by Gatehub, and apparently xrpcharts think that the USD value per REP is ~38M, rather than ~15.
  5. On Gatehub you either create a new XRPL account (wallet), and they generate an address and private key for you, or you import an existing XRPL account by entering your address and private key. When you trade on Gatehub (or send money, add trustlines …) their software is doing it for you – and it couldn't without knowing the private key. However, they do not store this private key in "plain text", but encrypted with your password. So Gatehub cannot do anything with your account for you – only when you have signed in and decrypted the private key for the active session. Since we have not received any details from Gatehub yet, except for an explanation of an API exploit, we (XRP Forensics) still find the most likely scenario to be a database hack (scenario 7 in https://medium.com/xrp-forensics/overview-of-the-gatehub-hack-f88a441c9203). Either this hack happened a long time ago, and the hacker has spent years brute forcing the encrypting private keys OR the database also contained user information (hashed user passwords, e-mail addresses etc), and have cracked as many passwords as possible. If the latter, the cracked passwords could be used to decrypt the private keys. We have long believed that the database could have been sold on the dark web, making the hackers and the thieves two different groups of people. If this is the case, the API exploit is only a "symptom" of the real problem.
  6. Nothing wrong with considering worst case scenarios. But likely Gatehub doesn't even store KYC material themselves. And I'd rather focus on more likely scenarios first, since the evidence on the XRPL doesn't point in that direction
  7. You're describing a worst case scenario, but there is no reason to believe, or any indicators pointing to KYC material being stolen. The stolen funds has been processed through less than 20 exchanges, some of which don't have KYC requirements and are exchanging services. On other exchanges they have re-used old exchange accounts, that are connected to other criminal activity. The stressful boost in liquidating funds yesterday and today leaves much room for errors and slip-ups. I am convinced that law enforcement will have an easy job of finding at least some of the perpetrators behind the heist.
  8. Comment on last paragraph: Lastest victim is from yesterday, latest cashout was today. Perpetrator is using more than 30 accounts. We prepared a chart of the thefts:
  9. I am sorry about the confusion – too fast on the trigger. The e-mail topic is the same on legit mails coming from Gatehub, but if the mail comes from gatehub.com and contain a secret key, it is a phishing attempt.
  10. We have had reports that some people are receiving phishing e-mails with an e-mail that contains new wallet information that @gatehub supposedly has created to move funds to safety. The e-mail contain a new address AND secret key for the user and instructions on how to import it to Gatehub. If you receive an e-mail with a secret key, or matching the description above, it is NOT from Gatehub, but a phishing attempt. If you have a copy of said e-mail, please forward it to info@xrpforensics.org.
×
×
  • Create New...