How do hackers steal BTC from exchanges
stolen
mark kalpler, chief executive of mt.gox, bowed his apology at a news conference held in Tokyo yesterday, saying that "the loss of bitcoin is e to a loophole in the company's system"
a lawyer for Mt. GOx said that almost all the bitcoins traded on the platform were stolen, including about 750000 bitcoins in the user's trading account and about 100000 bitcoins in Mt. GOx's own account. According to the trading on February 28, the loss is estimated to be about $467 million
according to media reports, mt.gox trading platform had more than 1 million accounts at its peak, mainly from customers outside Japan, including many users trading more than US $10000. Some bitcoin investors have rushed to Tokyo from overseas in an attempt to recover trading funds from Mt. GOx
on February 7, e to hacker attacks, mt.gox temporarily stopped the bitcoin extraction business, causing transaction confusion and user dissatisfaction. From the noon of February 25, users cannot log in to mt.gox trading platform. The home page of the website then pasted a "notice to customers" to suspend all transactions
Li, a native of Hefei, spent 140000 yuan to buy 124 bitcoins in October this year. Afterwards, Li joined some chat groups of bitcoin players to pay close attention to the bitcoin market. On October 22, a person named Michael in the group took the initiative to chat with Li and asked him if he was mining“ I won't, and I won't get any money. " Mr. Li replied. Michael repeatedly urged Li to have a try and sent him a "mining tool", claiming that he could use the tool to dig more bitcoin. In the subsequent chat, Michael constantly reminds Li to put bitcoin in his wallet, saying that the trading website is not safe“ From time to time, there are news that trading websites are closing down and running away. What he said is quite reasonable, so I believe him. " Li told Anhui Business Daily
100 bitcoins disappeared
Li received and installed mining tools. On the evening of October 26, he was inced by Michael to put 100 bitcoins in his wallet. However, when the bitcoin in the E-wallet just reached 100, it suddenly disappeared. Li suddenly panic God, and then contact Michael, the convenience of invisible disappeared
Li told reporters that at present, a bitcoin costs about 5000 or 6000 yuan, and 100 bitcoins are worth 500000 or 600000 yuan. Afterwards, Li reported the case to the police. However, to Li's disappointment, because bitcoin is a virtual currency, there is no relevant domestic law to regulate and protect its transactions. The police did not file a case“ Now, this man named Michael is still active on the Internet. He's just taking advantage of the law. " Li told Anhui Business Daily
there is a Trojan horse in "mining tools"
How could Li's bitcoin disappear? 360 security engineer contacted him and tested Michael's "mining tool", and found that this tool is a very popular "bitcoin robber" Trojan horse this year. According to the analysis of 360 security center, most of the "bitcoin thieves" Trojans are disguised as mining tools, simplified wallets and other compressed files. Once a player is recruited, the Trojan will automatically search for bitcoin wallets and steal them through e-mail, hacker remote control and other means.
March 25 (Xinhua) Zhong, an employee of an Internet technology company in Haidian District of Beijing, took advantage of his position to steal 100 bitcoins from the company by inserting codes with the permission of the administrator to modify the application program in the company's server. Reporters learned from the 24 people's Procuratorate of Haidian District, Beijing, that the procuratorial organ approved the arrest of the suspect according to the law on suspicion of illegally obtaining the data of computer information system. P>

the prosecutor of the case, Ji Jingling, said that according to the criminal law of the People's Republic of China and the relevant laws and regulations, the suspect, Zhong Mou, violated the state regulations and used technical means to acquire data stored in the computer information system. His behavior had violated the criminal law and was suspected of illegally obtaining data from computer information system. The procuratorial organ has approved the arrest of the suspect Zhong Mou according to law. p>
at present, the vast majority of digital currency transactions are concted in exchanges. Among the numerous exchanges, bitfinex, binance, okex and so on are well-known
However, bitcoin and other digital currencies, as decentralized assets, have to be traded in a centralized exchange, which seems to have hidden contradictions and dangers1. Problems and challenges of stock exchanges=“ //www.yuanxue365.com/en/img_fd039245d688d43fdf16c83b761ed21b0ff43bbf ">
in February 2014, Mt. GOx, the world's largest bitcoin exchange at that time, was stolen 850000 bitcoins, and the price of bitcoin suffered a" cliff "crash on that day. Later, it was revealed that Mt. GOx was in fact a thief, and only 7000 bitcoins were actually stolen
in August 2016, bitfinex, the largest U.S. dollar bitcoin trading platform, suffered a security vulnerability, resulting in the theft of 120000 bitcoins, which was worth $65 million at that time. If converted into the price in December 2017, it would be worth nearly $2 billion
on December 19, 2017, South Korea's youbit exchange was attacked by hackers and lost 4000 bitcoins, and the exchange declared bankruptcy
on December 21, 2017, the Ukrainian liqui exchange was stolen 60000 bitcoins, and the unit price of bitcoin plummeted by US $2000
in 2018, such a drama will only continue
in addition to the threat of hackers, traditional exchanges also have some inherent shortcomings, such as lack of supervision and inefficiency. The security of the exchange for investors can only rely on its own credit, and the cost of running is very low. The stock exchange is regulated at the national level, but there is no such sword of Damocles on the top of the digital currency exchange. Moreover, in an exchange, the same order can only be submitted to one exchange. After the user places an order, the funds used for the transaction will be frozen and can only wait for the completion or cancellation of the transaction. These are undoubtedly inefficient
All in all, the problems of exchanges are the problems of centralization2. Decentralization of exchanges=“ //www.yuanxue365.com/en/img_86d6277f9e2f070889a173c9e224b899a801f257 ">
(1) the progress of the exchange itself
the upgrade of security means is various. At present, the best use is cold wallet, that is, to keep the digital currency in the offline U disk. At the end of 2017, when the YouTube exchange was attacked, 75% of its assets were withdrawn into the cold purse in time to avoid greater losses. However, it seems to be a helpless way to protect the online assets by offline means. Of course, there should be many other methods, which will not be repeated here
(2) the representative of cross ledger transaction is ripple network, and the operating company is ripple labs, which is a semi centralized system. Ripple is a decentralized clearing agreement. In order to solve the high cost and delay of inter-bank clearing, its base currency is XRP. Ripple network can connect all kinds of assets, such as US dollar, RMB, Japanese yen, bitcoin, etc. to its own network. In this system, U.S. dollars or bitcoin can be converted into reborn currency, and then reborn currency can circulate freely in the network, just as a highway is built between various assets. Due to the support of major banking institutions, the reborn currency achieved nearly 300 times growth in 2017
(3) decentralized exchange
some teams try to use blockchain technology to build a decentralized exchange. This kind of decentralized exchange, to some extent, is an extension of cross ledger trading
bitshares is the most representative of early rising projects. It builds a blockchain development platform with servers scattered all over the world. Even if some of them are attacked, the system will not collapse. Anyone can transfer money and borrow money freely on this platform, and can also quickly build a centralized exchange based on this platform. In order to ensure stable value, bitstocks also require three times of digital assets as collateral. At present, bitstocks are running fairly well
later, with the development of Ethereum and smart contract, the x x protocol came into being. This is an open protocol running in the Ethereum blockchain and a decentralized exchange in the Ethereum ecosystem. The agreement has attracted many investors. At present, it has completed financing and started to build open source software tools and infrastructure. Of course, there are many competitors. Ether Delta, IDEX and oasis DEX are trying to provide similar functions. Moreover, it is a smart contract system based on Ethereum, which only supports erc20 token. If other smart contract public chains start to rise, the demand will be reced
in addition, there are some teams that are entering, such as the domestic road seal agreement, looping (LRC) in English. They adopted a design similar to the X protocol, and also introced a fast payment function similar to the lightning network. It is characterized by trying to match multiple exchanges, the user's order can be broadcast to multiple exchanges, and completed by different exchanges. Moreover, the user can still use the account funds after placing an order, and the user's behavior of transferring part or all of the funds is equivalent to partial or total cancellation. To some extent, it improves the breadth and timeliness of the transaction. However, this system seems to have damaged the "power" of the existing exchanges. Whether we can persuade everyone to play together will be a difficult problem
At present, there is still a long way to go for the construction of decentralized exchange. In 3-5 years, traditional exchange will still be the main battlefield of digital currency However, in the future, it is worth looking forward to let the decentralized digital currency get rid of the shackles of centralizationthe British dress pattern is highly praised by many people in the world. Although British people are fastidious about clothes, they are very thrifty. A suit of clothes usually takes ten to eight years. An English man usually has two sets of dark clothes and two or three pairs of grey trousers. British clothing has been diversified and comfortable. Casual jacket and jeans are more popular
manners
in Britain, people extend their right index finger and middle finger in speeches or other occasions, with the palm of the hand outward, forming a V-shaped gesture to express victory; In Britain, if someone sneezes, others will say that they will bless you to show good luck
meeting etiquette
in Britain, when a baby is born, parents, relatives and friends usually name the baby according to the characteristics of the baby and the father's occupation. Some mothers have prominent families, so they use their mother's family name as the second name of the baby. In Britain, children are only called uncles to their parents' brothers and sisters. British old people pay attention to independence. They don't like others to call themselves old. They don't have to help them when they walk<
dining etiquette
hospitality and table manners
if you are invited to someone else's home, you should consider the following situations. For example, when should I get to the host's house? If it's not about business, it's just a social gathering. It's impolite to arrive early. The hostess is making preparations, and it will be very embarrassing for her to arrive before she is completely ready. It's best to be 10 minutes late. It's too late to be half an hour late. I need to apologize to the host. When should I leave? There are no rules, but it's impolite to sit too late at the host's house. If you're just invited to dinner and chat, you'd better leave between 10 and 11 or say goodbye an hour after dinner. If you are invited to stay for a few days or a weekend, you should buy a bunch of flowers for the hostess before you leave, which will make her very happy. In addition, the next day after you leave, you should send a note of thanks to the host with a small gift, such as a box of chocolates or some flowers
there are many kinds of banquets in Britain, mainly tea parties and banquets, including formal and informal tea parties. British people don't serve dishes or encourage wine ring the dinner. They just depend on the interest of the guests. Generally speaking, it's polite to eat all the dishes. When the waiter pours wine, the person who doesn't drink will put his hand to the mouth of the cup. Guests can shake hands or nod their heads when they say goodbye
British people generally prefer the following cooking methods: stewing, barbecue, frying and frying. They have unique ways of cooking meat, seafood and game; However, they have a special preference for beef, such as roasted beef, which is not only accompanied by seasonal vegetables and roasted potato, but also a little mustard sauce on the steak; In the use of seasoning, they prefer cream and wine; On the other hand, they like meat, cinnamon and other fresh spices
the well-known British dishes are steak kidney pie, English fish chip and chicken a la king. British people like hunting. During the hunting period, which is only once a year, many restaurants or restaurants will offer game meals, such as the cooking of venison, hare, pheasant, wild goat, etc. Generally, juniper nuts, berries and wine are used to remove the fishy smell of the food
British people are very particular about breakfast! British restaurants offer a wide range of dishes, including juice, fruit, eggs, meat, porridge, bread, jam and coffee. Nowadays, the popular high tea is also spread from the UK. Its more famous is Victoria style, which includes all kinds of snacks, muffins, tarts and sandwiches. Dinner is also the most important part of British people's daily life. They usually choose a late meal time and chat while eating to promote the friendship between diners. It can be imagined that they belong to a nation with great autonomy, and a dinner may take them several hours
Scotch whisky or gin are all well-known wines, and they all come from it. In Britain, there are many people who like to drink, mainly because it is also a wine procing country. The British spend more on alcohol than on other things
funeral etiquette
the marriage customs of the English people are rich and varied, and they all follow their own traditional ways from proposing to honeymoon. In York City in northern England, the way of marriage proposal is quite strange. It inherits the ancient folk custom. When a girl is mature and needs to get married, she puts on tight clothes of different colors and signals to the man. Different colors mean different things, just like traffic lights. Green means: & quot; Come on! I'm willing to fall in love and pursue it boldly& quot; Yellow means: & quot; There are opportunities. If it suits me, there is still a chance of success& quot; Red indicates: & quot; At present, I don't want to fall in love, don't pursue me& quot; The brave young man will pursue boldly according to the other party's clothing color and his own choice, and will never be labeled as misbehaving
once the relationship is established, the man will give the woman an engagement ring and hold a ceremony. This custom is found all over England. Wedding or engagement ring is a traditional custom of many nationalities. When the English hold a wedding ceremony in the church, it is indispensable for the bridegroom to wear a ring for the bride. People even think that marriage without a ring is invalid. When the priest asks a couple if they are willing to be each other's wife or husband, whether they can respect each other and grow old together, the groom puts a ring on the bride's ring finger. It symbolizes the husband's pure love for his wife. At the same time, the wife also expresses that she accepts and is faithful to this kind of love
the custom of wearing rings can be traced back to ancient Egypt and China. It is not only a keepsake but also an ornament. At first, the wedding ring is not inlaid with diamond, emerald, ruby and sapphire. The pure circle symbolizes the reunion of two people who are married together. In some ethnic groups, it symbolizes a kind of magic power to bless the couple's happiness and longevity. At the same time, the giver expresses his trust in the receiver, and the receiver expresses his loyalty to the giver
the gold ring symbolizes the innocence of love, and the silver ring means tenderness of emotion. Like western countries, engagement rings are made of gold and not inlaid with any gems. Wedding rings should be decorated with ornaments. As for the quality of the rings, it depends on the indivial's economic conditions. The engagement ring and the wedding ring can be worn on the same ring finger, or the engagement ring can be replaced by the wedding ring
in England in the 16th century, the inside of the wedding ring was often engraved with family patterns or proverbs, such as & quot; God made me so and so's wife; The ring of a bishop's wife is engraved with a hand, a heart, a bishop's crown and a skeleton, and the inscription is: & quot; I give you the first three, and the fourth makes me detached& quot; Most of the inscriptions on today's rings are only engraved with the initials of the bridegroom's and bride's names
British people need to wear formal dress when they get married; The bride wears a white shirt, a white skirt, a white wreath, a long white veil and a white bouquet. In short, the British advocate white, which symbolizes the purity and good luck of love. The custom of wearing headdress can be traced back to the 10th century B.C., when women wearing headdress was popular in the two river valley. In ancient Greece, when a wedding ceremony was held, not only the bride wore a linen or wool veil, but also a couple wore a corolla. In Roman times, people of different religious beliefs had to wear different colored headdresses to show their differences. After the middle ages, the crown decorated with pearls appeared among the nobles. Later, it developed into a white veil, and the size of the veil was extended day by day, and spread all over Europe
ring the wedding ceremony, the bride, wearing a white dress, holds her father's arm and is accompanied by the female guests. She enters the church in the wedding march. Accompanied by the male guests, the bridegroom in full dress stands at the altar waiting for the bride. When someone dies in an English family, a small notice is often published in the newspaper. After seeing the notice, relatives and friends go to the funeral to show their respect for the dead and greetings to their families
once the wedding ceremony is held, when the bride and groom come out of the church, people should congratulate the new couple. This kind of congratulations is not kissing, hugging and shaking hands, but scattering colorful scraps of paper on them. The custom of scattering paper scraps originated from scattering wheat grains. In 1491, King Henry VII of England traveled to Bristol with his queen. During the journey, she was seen by a baker's wife, so she sprinkled wheat grains on them from the window and cried out: & quot; Welcome, your majesty! I wish you happiness and longevity& quot; By the 16th century, this custom had been widely spread. People sprinkled wheat grains on the bridegroom and bride, and sometimes dyed various colors. The grain of wheat symbolizes a good harvest and a rich life. At the same time, it also congratulates the newlyweds on their happiness and longevity, and the family is full of children and grandchildren
honeymoon is also an important part of youth marriage in Britain. They spend the money they have saved on traveling, and traveling after marriage is called honeymoon. This was originally an ancient custom. When you get married, you must drink a special drink made with honey to symbolize family happiness, sweet love and happy life. This kind of drink takes 30 days from the beginning of marriage, so the first month of marriage is called honeymoon
in Britain, wedding anniversary is very important, which is celebrated every year and has different titles. The first year is paper marriage, the second year is cotton marriage, the third year is leather marriage, the fourth year is Yi marriage, the fifth year is wood marriage, the sixth year is iron marriage, the seventh year is bronze marriage, the eighth year is pottery marriage, the ninth year is willow marriage, the tenth year is tin marriage, and then there are steel marriage, Raoren marriage, lace marriage, ivory marriage and crystal marriage. Since the 15th year, there has been a title every five years, which is enamel marriage, silver marriage (the 25th year is a big ceremony), pearl marriage, coral marriage, ruby marriage, sapphire marriage, gold marriage (the second big ceremony in the 50th year), jade marriage and diamond marriage. This last one is the third big celebration, but few people can celebrate it
business etiquette
when you go to the UK for business activities, you should avoid July and August. During this period, people in the instrial and commercial circles take more holidays. In addition, it is not suitable to carry out business activities at Christmas and Easter. In Britain, no heavy gifts are allowed to avoid the suspicion of bribery. During the business meeting, you should come at the appointed time in advance. You are not allowed to arrive early or late. British business people are serious, not easy to move feelings and express their views. They regard boasting and boasting as a sign of lack of ecation
Travel etiquette
when you travel to the UK, you should pay attention to that all local vehicles drive along the left side of the road. British people abide by discipline, even if a few people get on the bus, they will consciously line up to get on the bus. In Britain, when taking a taxi, you usually tip about 10%. Hotels that include tips in the service charge bill don't have to pay extra tips. At the master's house
server security configuration essence skills
Windows2000 contains many security functions and options. If you configure them reasonably, Windows 2000 will be a very safe operating system. Physical security
the server should be placed in the isolated room where the monitor is installed, and the camera record should be kept for more than 15 days. In addition, the chassis, keyboard, computer desk and drawer should be locked to ensure that other people can not use the computer even if they enter the room, and the key should be put in another safe place
2. Stop the guest account
stop the guest account in the computer management user, and the guest account is not allowed to log in to the system at any time. To be on the safe side, you'd better add a complex password to the guest. You can open Notepad, enter a long string containing special characters, numbers and letters, and it as the password of the guest account
3. Limit the number of unnecessary users
remove all plicate user accounts, test accounts, shared accounts, general department accounts, etc. User group policy sets the corresponding permissions, and often checks the system accounts, delete accounts that are no longer in use. These accounts are often the breakthrough point for hackers to invade the system. The more accounts in the system, the more likely hackers will get the permission of legitimate users. For NT / 2000 hosts in China, if there are more than 10 system accounts, one or two weak password accounts can be found. I once found that 180 of 197 accounts in a host are weak password accounts
4. Create two administrator accounts
although this seems contradictory to the above point, in fact, it is subject to the above rules. Create a general permission account to receive mail and handle some common things, and another account with administrator permission can only be used when needed. The administrator can use the "runas" command to perform some work that requires privileges to facilitate management
5. Change the name of the system administrator account
as we all know, the administrator account of Windows 2000 can't be disabled, which means that others can try the password of this account over and over again. Changing the name of the administrator account can effectively prevent this. Of course, please don't use the name of admin. If you change it, it means you haven't changed it. Try to disguise it as an ordinary user, such as guest one
6. Create a trap account
what is a trap account? Look!& gt; Create a local account called "Administrator", set its permissions to the lowest level, and add a super complex password with more than 10 digits. In this way, the scripts can be busy for a period of time, and their intrusion attempts can be found. Or do something with its login scripts. Hey, hey, enough damage< Change the permission of shared files from "everyone" group to "authorized users"
"everyone" in WIN2000 means that any user who has the right to enter your network can obtain the shared data. Do not set the users of shared files as "everyone" group at any time. Including print sharing, the default attribute is "everyone" group, so don't forget to change it
8. Using secure password
a good password is very important for a network, but it is the most easily ignored. What I said above may have explained this point. When some company administrators create accounts, they often use the company name, computer name, or some other guessing thing as the user name, and then set the passwords of these accounts to n simple, such as "welcome", "iloveyou", "letmein" or the same as the user name. Such an account should require the user to change the password to a complex one when logging in for the first time, and pay attention to changing the password frequently. A few days ago, when IRC discussed this issue with people, we gave a definition of good password: a password that can't be cracked ring the security period is a good password. In other words, if someone gets your password document, it will take 43 days or longer to crack it, and your password strategy is that you must change your password within 42 days
9. Setting the screen saver password
is very simple and necessary. Setting the screen saver password is also a barrier to prevent insiders from damaging the server. Pay attention not to use OpenGL and some complex screen saver, waste system resources, let him black screen is OK. Also, it's better to add a screen saver password to all the machines used by system users
10. Use NTFS format partition
change all partitions of the server to NTFS format. NTFS file system is much safer than fat, FAT32 file system. Needless to say, everyone's servers must have been NTFS
11. Running antivirus software
I have never seen WIN2000 / NT servers with antivirus software installed. In fact, this is very important. Some good antivirus software can not only kill some famous viruses, but also check and kill a large number of Trojans and backdoor programs. In this case, the famous Trojans used by hackers are useless. Don't forget to upgrade the virus library frequently
12. Ensure the security of the backup disk
once the system data is damaged, the backup disk will be the only way for you to recover the data. After backing up the data, keep the backup disk in a safe place. Do not back up the data on the same server, in that case, it is better not to back up<
intermediate security:
1. Use WIN2000's security configuration tools to configure policies
Microsoft provides a set of MMC (management console) based security configuration and analysis tools, with which you can easily configure your server to meet your requirements. Please refer to Microsoft home page for details:
http://www.microsoft.com/windows200...y/sctoolset.asp
2. Turn off unnecessary services
Terminal Services, IIS and RAS of Windows 2000 may bring security vulnerabilities to your system. In order to manage the server remotely and conveniently, the terminal services of many machines are on. If your terminal services are on, make sure that you have configured the terminal services correctly. Some malicious programs can also run quietly in the form of services. Pay attention to all the services on the server and check them on a daily basis. The following are the default services for C2 level installation:
Computer Browser service TCP / IP NetBIOS helper
Microsoft DNS server spooler
NTLM SSP server
RPC locator wins
RPC service workstation
Netlogon event log
3. Closing unnecessary ports
closing ports means recing work Yes, you need to make some decisions about security and function. If the server is installed on_ blank"& gt; Behind the firewall, risk will be less, but never think you can rest easy. Using the port scanner to scan the open ports of the system and determine which services are open is the first step for hackers to invade your system 92; system32\ drivers\ etc\ There are well-known port and service comparison tables in the services file for reference. The specific methods are as follows:
Network Neighborhood & gt; Properties & gt; Local connection & gt; Properties & gt; Internet Protocol (TCP / IP) & gt; Properties & gt; Advanced & gt; Options & gt; TCP / IP filtering & gt; Property to open the TCP / IP filter, add the required TCP, UDP, protocol< Open audit policy is the most basic intrusion detection method in WIN2000. When someone tries to invade your system in some way (such as trying user password, changing account policy, unauthorized file access, etc.), it will be recorded by security audit. Many administrators didn't know that the system was invaded for several months until the system was destroyed. The following audits must be enabled, and others can be added as needed:
policy settings
audit system login event success, failure
audit account management success, failure
audit login event success, failure
audit object access success
audit policy change success, Fail
audit privilege successfully, fail
audit system event successfully, Failure
5. Open password policy
policy setting
password complexity requires enable
minimum password length 6 bits
forced password history 5 times
forced password history 42 days
6. Open account policy
policy setting
Reset account lock counter 20 minutes
account Lock time 20 minutes
account lock threshold 3 times
7. Set the access rights of security records
security records are unprotected by default, and only administrators and system accounts can access them
8. Store sensitive files in another file server
although the hard disk capacity of the server is very large, you should consider whether it is necessary to store some important user data (files, data tables, project files, etc.) in another secure server and back them up frequently
9. Do not let the system display the last login user name
by default, when terminal services access the server, the last login account will be displayed in the login dialog box, and the local login dialog box is the same. This makes it easy for others to get some user names of the system, and then guess the password. Modify the registry to prevent the dialog box from displaying the last login user name, specifically:
HKLM & # 92; Software\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon\ Dontdisplaylastusername
put reg_ The key value of SZ is changed to 1.
10. It is forbidden to establish an empty connection
by default, any user can connect to the server through an empty connection, and then enumerate the account number and guess the password. We can modify the registry to prohibit the establishment of empty connections:
local_ Machine\ System\ CurrentControlSet\ Control\ The value of LSA RestrictAnonymous can be changed to "1"
10. Download the latest patch from Microsoft website
many network administrators are not used to visiting secure sites, so that some vulnerabilities have been found for a long time, and the server vulnerabilities are not targeted. No one can guarantee that there will be no security loopholes in the 2000 version of millions of lines of code. They often visit Microsoft and some security sites to download the latest service pack and bug patch
