Attacks/Breaches
3/4/2014
08:07 PM
Connect Directly
RSS
E-Mail
50%
50%

Mt. Gox Bitcoin Meltdown: What Went Wrong

Transaction malleability attacks and cold-storage software bugs both cited after nearly $500 million worth of bitcoins vanish

Mt. Gox, recently the world's third-largest bitcoin exchange, has melted down in spectacular fashion, triggering an investigation by Japanese authorities. The CEO of Tokyo-based Mt. Gox, Mark Karpeles, filed for bankruptcy protection Friday, revealing that about $500 million in bitcoins stored by the exchange have been stolen, comprising 750,000 bitcoins deposited by users of the site, and 100,000 owned by Mt. Gox.

But in the bankruptcy filing, the exchange reported that it doesn't know what technique -- or techniques -- attackers used to steal the bitcoins, exactly how many were stolen, or when the thefts occurred. While Mt. Gox suspects that the exchange was hacked, it's reviewing transaction reports to establish what happened. "As of this date, we cannot confirm the exact amount of missing deposit funds and the total amount of bitcoins which disappeared," it said.

Karpeles, speaking Friday at a Tokyo press conference called to announce the company's bankruptcy, said that unspecified weaknesses were to blame. "We had weaknesses in our system, and our bitcoins vanished. We've caused trouble and inconvenience to many people, and I feel deeply sorry for what has happened," he said, reported Wired.

Read the full article here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Mathew Schwartz is a freelance writer, editor, and photographer, as well the InformationWeek information security reporter. View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.