EvilZone
Hacking and Security => Hacking and Security => : vezzy August 31, 2013, 11:56:26 PM
-
http://secupost.net/ (http://secupost.net/)
What actually happened:
http://www.chronicles.no/2013/08/bitmessage-crackdown.html (http://www.chronicles.no/2013/08/bitmessage-crackdown.html)
https://bitcointalk.org/index.php?topic=278757.0 (https://bitcointalk.org/index.php?topic=278757.0)
Basically some guy massively spammed Bitmessage users with a message that claimed several cryptographic weaknesses were unearthed in the Bitmessage protocol, linking to his attack site that mapped BM addresses to IPv4 addresses, ISPs and user agents. On the user's end, all they saw was a false 500 error.
This is the miner code he used to send so much messages (OpenCL magick):
https://github.com/bm-robertwhite/bitmessage-powfaster (https://github.com/bm-robertwhite/bitmessage-powfaster)