Do hackers ever stop here?

Wish Swiftdeath

Desert Nomad

Join Date: Feb 2007

Mo/W

Quote:
Originally Posted by Regina Buenaobra View Post
We’re currently investigating this specific series of incidents. The more data we are able to put together, the more information we’ll have to get to the bottom of this, so we would like to get in touch with the players who were affected. This request applies ONLY to players who were affected by this recent incident. Unless you match these criteria below, please go through the support ticketing system:
  • Your account was affected on February 22 or February 23.
  • You were able to login (your password was not changed).
  • You had gold and/or items removed, or items added to your account

It would really help the support team know the following details when you write:
  • The outpost your character was in when you logged in.
  • Whether any characters were deleted.
  • Exactly what was removed and/or what item(s) may have been deposited on the account by someone other than yourself in the last two days.

Any other details of note, no matter how small.

If you believe you were affected by the incident yesterday, please contact [email protected], and provide you real name, account name, and a telephone number (along with the time you could accept a call about this matter and your time zone). Please note that the earliest you can expect a phone call is tomorrow.

Thanks.
awesome, glad anet is looking into it

I pwnd U

I pwnd U

God of Spammers

Join Date: Oct 2005

in the middle of a burning cornfield...

Scars Meadows [SMS] (Officer)

ANet is going to CALL people? Wow that is pretty cool... usually you have to call them.

garethporlest18

garethporlest18

Forge Runner

Join Date: Jan 2006

[HiDe]

W/

Well I hope you get to the bottom of it Regina, I don't like the idea of people being able to access accounts when those people supposedly didn't make a mistake.

{IceFire}

{IceFire}

Forge Runner

Join Date: Oct 2005

W/

Sent in the email Regina, thanks for the concern

Jensy

Jensy

Site Contributor

Join Date: Apr 2007

Phoenix, Arizona

Blinkie Ponie Armie [bpa]

N/Mo

That's.... more than a bit worrying. But at least they're working on it? O___O

Balkoth

Ascalonian Squire

Join Date: Apr 2005

Amerika

[TofT]

Quote:
Originally Posted by Regina Buenaobra View Post
Unless you match these criteria below, please go through the support ticketing system:

If you believe you were affected by the incident yesterday, please contact [email protected], and provide you real name, account name, and a telephone number (along with the time you could accept a call about this matter and your time zone). Please note that the earliest you can expect a phone call is tomorrow.
What if we already filed a ticket? Should we provide another email? or should we continue to addon to the plaync ticket information?
Is there any other advise you can give us in the mean time?
Stay loged on? Don't login? Don't do online bill pay etc?

Regina Buenaobra

Regina Buenaobra

ArenaNet

Join Date: Apr 2008

Me/

Quote:
Originally Posted by Balkoth View Post
What if we already filed a ticket? Should we provide another email? or should we continue to addon to the plaync ticket information?
Is there any other advise you can give us in the mean time?
Stay loged on? Don't login? Don't do online bill pay etc?
If your incident fits the criteria, go ahead and email the address above, providing all the information listed. Also include your support incident number as well, so they will be able to cross-reference the information.

Continue to work with PlayNC, and let them know that you have emailed the Support Liaison about this.

Yawgmoth

Yawgmoth

Furnace Stoker

Join Date: Apr 2005

Let's get all the facts together, with the help of all affected users.

Strangely the only reports of those incidents I've seen here in this thread, and none on other forums or wikis.

By the procedure of how the hackings were done it's clear that it has to be a RMT company, it's a massive scale project they're doing in a great hurry.
They're not malicious so don't delete any characters, they only rob, as fast as possible.
They only take top value quickly sellable items or pure currency (gold/zk/e) and always trade some junk back as a mean of preventing automated detection.
They're in great hurry so often miss obviously valuable items.
They don't change passwords - they most likely can't - it may mean this method doesn't allow that, or they would do it for sure, as accounts are more valuable to them than some money.

So some Questions that hacked people should answer, so we get more facts:

Admin Edit: You are asking questions that could compromise someone's account security.

Lyssa Apate

Lyssa Apate

Academy Page

Join Date: Jan 2008

The Netherlands

Eevee Breeders United [cute]

Me/

I'd just like to add that the same happened to me. (Had to be between Monday 01:00 and 14:00 GMT+1) Someone traded my 75e for a Mini Windrider, nothing else is missing.

Shayne Hawke

Shayne Hawke

Departed from Tyria

Join Date: May 2007

Clan Dethryche [dth]

R/

I've sent an e-mail to the Support Liason per Regina's request. This will hopefully be sorted out soon.

Xun Rama

Xun Rama

Ascalonian Squire

Join Date: Jan 2009

W/A

Haven't been hacked, just scanned my Gw.exe here. Mine's completely clean it looks like?

Code:
File:  	 Gw.exe
Status: 	OK
MD5: 	e3446754fbd659170df74dd63ff1506d
Packers detected: 	-
Scanner results 

Scan taken on 24 Feb 2009 02:35:45 (GMT)
A-Squared 	Found nothing
AntiVir 	Found nothing
ArcaVir 	Found nothing
Avast 	Found nothing
AVG Antivirus 	Found nothing
BitDefender 	Found nothing
ClamAV 	Found nothing
CPsecure 	Found nothing
Dr.Web 	Found nothing
F-Prot Antivirus 	Found nothing
F-Secure Anti-Virus 	Found nothing
Ikarus 	Found nothing
Kaspersky Anti-Virus 	Found nothing
NOD32 	Found nothing
Norman Virus Control 	Found nothing
Panda Antivirus 	Found nothing
Sophos Antivirus 	Found nothing
VirusBuster 	Found nothing
VBA32 	Found nothing

iVendetta

iVendetta

Lion's Arch Merchant

Join Date: Nov 2008

Where no man has ever gone before.

Syndicate Nightmare [SyN]

Stop feeding yourself to the phishers.

Adult

Adult

Krytan Explorer

Join Date: Mar 2008

South Texas

Paper St Fight Club [Soap]

Mo/

Ok. After reading about how everyone, including myself, who have been hacked over the last few days I have come to a conclusion. There is something we all have in common that a hacker could exploit. While we all have all these badass security thingies and un-beatable passwords, none of it matters if i am right.

If we look at this situation holistically...it tells us that the hacker has a very easy way of getting in to all of our accounts... the hacker hacked Anet.

It makes perfect sense to me. All our account info is there, emails and passwords. They can see when we log off, and there is probably a way to validate what is in the inventories of what ever accounts they look at. Why not go after the super rich? I am guessing they haven't come across those accounts yet...

Anyone see my logic here or am i paranoid?

Shayne Hawke

Shayne Hawke

Departed from Tyria

Join Date: May 2007

Clan Dethryche [dth]

R/

Quote:
Originally Posted by Adult View Post
Anyone see my logic here or am i paranoid?
I believe that ANet would have realized and halted any attempt that was targeting them directly to harm/steal other players' accounts. Someone hacking ANet or Guild Wars would be the easiest explanation for it being the most easily visible common factor. However, that seems like the least likely as well, and they probably would have told us already if there was a security breach made/fixed at their end.

Balkoth

Ascalonian Squire

Join Date: Apr 2005

Amerika

[TofT]

Quote:
Originally Posted by Shayne Hawke View Post
I believe that ANet would have realized and halted any attempt that was targeting them directly to harm/steal other players' accounts. Someone hacking ANet or Guild Wars would be the easiest explanation for it being the most easily visible common factor. However, that seems like the least likely as well, and they probably would have told us already if there was a security breach made/fixed at their end.
I agree. I would also narrow it down to our web history, I use Opera 9.63 and I'v visited a number of gaming websites (gaming websites would most likely have gaming trojans) in the days leading up to the attack.

Which ones do we have in common? GameTrailers? Aion? NcSoft maybe?

zelgadissan

zelgadissan

Forge Runner

Join Date: Feb 2008

The Warrior Priests [WP]

Me/Rt

Thought I would hop in and mention that my hacked friend got a call from Gaile Gray herself less than an hour after emailing with what Regina requested, so this is being taken very seriously.

Coney

Coney

Wilds Pathfinder

Join Date: Aug 2008

Quote:
Originally Posted by Fril Estelin View Post
The way most AV work make it so that you need significant rewrite to escape heuristics. And I'm not even mentioning SW profiles and behaviour.
I'm highly skeptical of this, having coded high-level language assembers, as well as multi-threaded OS's. Perhaps the AV scanners finally use dis-assemblers and look for certain signatures, but it's more than simple to add memory/register swaps and use different registers to fool them, as well as simply changing more efficient instruction combinatorics for less efficient ones (or vice versa)... I'm betting adding buttloads of assy (conditional) jumpcodes fool most scanners, but I've not done a lot with detection. An 8k vs 20k vs 60k vs 640k keylogger gives a lot of room for *fudge*... I'm also suspicious of your use of the term "heuristics", having developed them for AI routines, but whatever (I suppose people still consider spam filters to be AI)...
Quote:
Originally Posted by Fril Estelin View Post
Where did you learn hacking 101? All modern compilers prevent most buffer overflows, and even if you had one on the GW servers, you wouldn't use it to swap sessions...
Did I not say *SOMETHING LIKE*? (checking...) "AKIN." As in, similar. How do you think most exploits of servers are found? Usually by sending strings of (more-or-less) random gibberish, and hoping that one of them causes the server to JMP (or fall through) to unexecutable (or out of range, or different range) code.

Who said *YOU* are the one swapping sessions? This may be the result of unintended faulty server-side code. As in, some session variable that should be CONST somehow gets overwritten by unintention, thus setting it to point elsewhere (merits of C++? LOL)...

101? Nice, Thx for the flames. You make the bad assumption that the in-house add-hoc compiler used by GW coders is *MODERN* (or complete, consistent, "peer-reviewed", etc). Are you going to jump my ass in this thread (like the other one) based on some technicality? Did I NOT say 2 was unlikely? (checking...) "QUITE A STRETCH." Pls, take the flames to private chat in the future.

Shayne Hawke

Shayne Hawke

Departed from Tyria

Join Date: May 2007

Clan Dethryche [dth]

R/

Quote:
Originally Posted by Balkoth View Post
I agree. I would also narrow it down to our web history, I use Opera 9.63 and I'v visited a number of gaming websites (gaming websites would most likely have gaming trojans) in the days leading up to the attack.

Which ones do we have in common? GameTrailers? Aion? NcSoft maybe?
There are two things that a person would need to quickly, easily, and successfully hack a GW account: a password and an e-mail/account name. You would have to compile a search based on where and when one of those two things was used at some other location than the GW client.

I'm sure that Regina would prefer that we send any such details to where she has directed so that they can be the ones holding the info and not have it posted here publicly on a forum.

One thing I'd like to bring up is that we don't really have any certainty as to when the information to our accounts was compromised. We just know that it was used against us in a short period just recently. This could have been a collection that was in the works for some time now and just suddenly activated.

Coney

Coney

Wilds Pathfinder

Join Date: Aug 2008

Quote:
Originally Posted by Jhadur View Post
Do any of the other people getting hacked have their accounts linked to NCSoft?
From what I've read so far, this is a blaring coincidence (until shot down!).

Balkoth

Ascalonian Squire

Join Date: Apr 2005

Amerika

[TofT]

Quote:
Originally Posted by Shayne Hawke View Post
There are two things that a person would need to quickly, easily, and successfully hack a GW account: a password and an e-mail/account name. You would have to compile a search based on where and when one of those two things was used at some other location than the GW client.

I'm sure that Regina would prefer that we send any such details to where she has directed so that they can be the ones holding the info and not have it posted here publicly on a forum.

One thing I'd like to bring up is that we don't really have any certainty as to when the information to our accounts was compromised. We just know that it was used against us in a short period just recently. This could have been a collection that was in the works for some time now and just suddenly activated.
I am working under the assumption that my login info was never divulged publicly as an account; not taken from another website. I was thinking along the lines of an infected webpage that spread enough trojans to infect enough computers that some contained mmo accounts that could be stolen. Once you login, it grabs your login packet and sends it to their server. So they could get any account they have prepared their trojan for (gw, wow, eve, steam, whatever they wanted really).
So then, what site was it. And if i am wrong, and it came from a single or mutliple other sites that we all have accounts on we should be able to single out what we have in common.

Inde

Site Contributor

Join Date: Dec 2004

Balkoth, you are assuming all the other hacked accounts had trojans such as you. Some people have clearly stated in this thread that their virus scanners came up clean. You could have 2 coincidences that are happening together here.

Balkoth

Ascalonian Squire

Join Date: Apr 2005

Amerika

[TofT]

Quote:
Originally Posted by Inde View Post
Balkoth, you are assuming all the other hacked accounts had trojans such as you. People have clearly stated in this thread that their virus scanners came up clean. You could have 2 coincidences that are happening together here.
ok, true. But that would still leave a site in common amongst us that we had accounts on. Wheather that site had some bad banner, or lost its db. its something in common.

TheGuildWarsPenguin

TheGuildWarsPenguin

Wilds Pathfinder

Join Date: Aug 2005

Los Angeles, California

Picnic Pioneers

E/

A few days ago, someone in GToB asked me to join their party and go into the Isle of the Nameless.

That person repeatedly disconnected+reconnected himself, asked me to use skills, and said he was "debugging" something and told me that it was related to the party window/formation.

Suspicious?
He said something like: [DEBUG] Searching for Agent ID 25 [DEBUG] Searching for Agent ID 26

I haven't noticed anything wrong with my account yet.

Gun Pierson

Gun Pierson

Forge Runner

Join Date: Feb 2006

Belgium

PIMP

Mo/

There are two things going on:

- people received private messages on guru to buy gold, z-keys and ectos.

- accounts get hacked: hacker is mainly interested in gold, z-keys and ectos it seems.

This might be coincidence.

The hacker(s) might be following this thread too.

Inde

Site Contributor

Join Date: Dec 2004

We have seen screenshots of emails being sent out trying to phish for account information, we have Regina reporting GW2 beta scam websites and youtube videos to get account information, we have Gaile Gray telling us the number of RMT's scamming and stealing accounts, we have people downloading 3rd party programs, we have people who buy GW gold, we have people who admit to not having secure passwords and somehow all of that is ignored in order to try to prove a connection. Maybe that's harsh, and while I do agree something is going on you have to step back and take in the big picture versus grasping.

Adult

Adult

Krytan Explorer

Join Date: Mar 2008

South Texas

Paper St Fight Club [Soap]

Mo/

Quote:
Originally Posted by Wubbies View Post
again..why is this anets responsibility? it's not anets fault you traded with someone and got taken to the cleaners. So basically if anet "cared" they would "protect customers"? how can anet protect against stupidity or people that understand about the trade window. How can anet make this any simpler? if they made it idiot proof and someone got taken through trade that person would say its anets fault why?

If anet was to keep us "happy" then they should do whatever we want then to do or i will not buy gw2. Get over it. again what happened to you was your fault not anets. ironically if you had 2 million worth of gold and stuff you would have to play the game along time to get that amount of money and not know how to use the trade window? either u full of shit or not very smart ..maybe both. no wonder why gw2 takes forever to come out with all these people QQ to anet about problems "They Have To Solve" becasue of player stupidity cause if you dont fix it i wont buy gw2. Bunch of babies.
You obviously either don't understand the situation or are not willing to listen.

I logged out...30 minutes later I logged back in to find my main account in GTOB not in TOA where I left her (doing vanquishing in that area so I'm 100% sure that's where i left myself)...I checked storage...They STOLE...theft...stealing... took my stuff (got it? ok just making sure)...330+ectos...100k....q9 VS...everlasting tonic...2 zkeys...maybe something else This was done by the hacker logging in as me and trading my items to his account in place of a Grail of Might (which I never use)... So if you bothered to read any of these posts you would find the same thing happened....we are all very protective of our passwords, accounts, names, whatever...logged in in GTOB and found things missing, so please read the posts first before you QQ our QQ...kthxbai

Gun Pierson

Gun Pierson

Forge Runner

Join Date: Feb 2006

Belgium

PIMP

Mo/

@ Inde: Ofcourse, the chance would be very small.

Changed my mail here as it was linked to my account, replaced it with a new email address, does the old still stay in your list?

Anyway they can prolly track him down fast.

Inde

Site Contributor

Join Date: Dec 2004

Nope, you change it, it changes it in the db.

Gun Pierson

Gun Pierson

Forge Runner

Join Date: Feb 2006

Belgium

PIMP

Mo/

Ok thanks for the info!

gone

Guest

Join Date: Jan 2007

not that it really matters...and I didn't screen shot it.

sometime around the new FF release 3.0.6 (of course I use no script/adblock plus/adblock filtersetG.updater) I think the release was around & about the last holiday event. anywho... and this has NEVER happened to me with this site...

I was getting a nice pop-up via FF stating this was an attack site. never happened before, and somehow it just magically went away. I never messed with a single setting.
-----------------------------
my GW.exe
http://www.virustotal.com/analisis/4...7871121892faba

Lycan Nibbler

Forge Runner

Join Date: Sep 2006

AZ

Quote:
Originally Posted by Adult View Post
I had about 2 mil worth of items, gold, ectos, tonics looted yesterday and a grail of might traded to me for it. The fact that someone is trading items to us for our items tells me a few things... it tells me that blank trades where someone trades stuff for nothing pops up on some "radar" at anet so they can track gold sellers/buyers and the such...So this also tells me that if blank trades are monitored then all trades are or can be monitored, so my conclusion is that if we are able to give a specific enough window of time then anet can track down who "i" traded to and what items were traded. End result, if someone at anet actually cared enough we could get all our stuff back and the other persons account could get banned, perhaps all accounts tracked form their originating IP could be banned as well, but that might be a bit much to ask.
This is what should happen - anet made the big announcement about tracking down all the duped armbraces from before (I dont believe they did, but thats another story), so IF they could track those things, then they could track these trades - there will be a common element at the end of these trails.

Unfortunately, we get what we pay for.. no monthly fee = little to no in game monitoring of what actually happens.

Lycan Nibbler

Forge Runner

Join Date: Sep 2006

AZ

Originally Posted by Jhadur
Do any of the other people getting hacked have their accounts linked to NCSoft?
Quote:
Originally Posted by Coney View Post
From what I've read so far, this is a blaring coincidence (until shot down!).
Was it not the NC Soft site that was attacked one time previously when people who had linked their accounts there were the ones attacked??

Good luck to the guys who got attacked anyway, I hope anet gets to the bottom of this and finds some way to reverse the trades.

the_jos

the_jos

Forge Runner

Join Date: Jun 2006

Hard Mode Legion [HML]

N/

Quote:
Originally Posted by Fril Estelin View Post
You'd be very surprised:
http://www.securityfocus.com/brief/762

<on MD5 dictionary attack>

Ok, I guess you're aware of the batches of MD5 collision done in the research litterature. Now, just so you know, experts are not expecting any real pratical progress before a few years, these were only theoretical attacks on MD5.

<on brute forcing passwords>

The guy who's going to do that will win bigger by being hired by the NSA, rather than exploiting his stolen data.
I just liked to respond on these two (and give others some insight in password safety).
First of all, the trojans used for gaining access to game accounts do excist.
However, when looking at their characteristics they are nothing compared to a banking trojan like Mebroot.

Second, while it might look hard to generate a MD5 dictionary or bruteforce them it's not that hard in reality.
It's not like we are generating collissions in huge documents.
We are talking about bruteforcing strings with known specifications.
We can safely asume that most of the passwords will be in the [a-Z][0-9] format. We can also assume that the password length is between 6 (if GW does not enforce a minimum of 8) and about 15 with the majority below 10 characters. That limits the list a lot.
Furtermore we can assume that the base of most passwords will be vulnerable against a dictionary attack.
So we take the dictionary and MD5 that one. Then we take that same dictionary and start adding numbers, making sure the total length does not exceed 10 (as start). So we start with '0password' to '99PASSWORD' and 'password0' to 'PASSWORD99'. Generating the MD5's on such lists is trivial.
And I think lists are available already. The same for SHA1.

Now if we were to compute a random string of [a-Z][0-9] things would already be different. Even at 9 characters we would be looking at an astonishing 13.000.000.000.000.000 combinations if I'm not mistaking. Add in an additional 25 uncommon characters and it will be 285.(lots of zero's again).
That's very time consuming to brute force.

So much for theory.
Practice is that people will use passwords that are vulnerable to dictionary attacks most of the time. That's the easiest to remember.
If that password is stored as 'plain MD5' in a database and that database is compromised (that's why you should not reuse passwords for things you care about) it's easy to obtain the real password.

As for people storing encrypted passwords in databases, it's easy to salt the password.
What it does is making each MD5 or SHA1 checksum 'unique'. If the word 'password' is encrypted this would generate a checksum (example, not going to calculate it for real) 'ABCD'. Doing the same with '1password' would generate 'DKFR' while '2password' would generate 'YRFT'. When the salt is long enough it would make the password impossible to obtain. Adding a salt of 3 characters [a-Z][0-9] would make it about 4.000 times harder to crack the password.
Doesn't look like much, but consider the 13.(many zeros) and multiply that one by 4000.
What I've done in the past is just using the UID to salt passwords.
Not on very sensitive information but in general it's good enough.

So much on this. Bottom line, use 'special characters' in your password, don't use important passwords on other places, try to avoid words from the dictionary.

And..... Why don't you write your password down and put it somewhere safe if you can't remember it because it's too complicated (like A^J$sT%P#@). It's not like someone willing to access your GW account will break into your house to obtain your password. Well, I assume you can trust your family....
The same for other important passwords. Just make sure that if someone does break into your house and obtains the list he/she can't do anything with it (so no UID/pass/application combinations).

Jhadur

Jhadur

Desert Nomad

Join Date: Jul 2005

Glob of Ectospasm [GoE]

Quote:
Originally Posted by Miss Drops Az View Post
Good luck to the guys who got attacked anyway, I hope anet gets to the bottom of this and finds some way to reverse the trades.
Anet told me when I was attacked that there is no way that they would be able to return any items taken. Even if they found the person that had done it.
(If they even looked of course)

Lycan Nibbler

Forge Runner

Join Date: Sep 2006

AZ

Quote:
Originally Posted by Jhadur View Post
Anet told me when I was attacked that there is no way that they would be able to return any items taken. Even if they found the person that had done it.
(If they even looked of course)
Yeah, I know that is their standard response . I hope though if it is identified as a concerted attack, that their position might change for you guys (unlikely - but I hope).

I've been somewhat paranoid, as I've been getting a lot of err7s the past few days myself (unusual for me) - got me checking under the bed (so to speak).

The Little Viking

Krytan Explorer

Join Date: Mar 2006

innergalactic gargleblasters

W/Mo

Quote:
Originally Posted by fenix View Post
That's what it does now, Gaile said a while ago. If you get the password wrong a few times, it kicks you out for an exponentially increasing amount of time, so brute forcing won't work. This must be keylogging or some packet manipulation or something.
If this was the case, then every night i would have to wait to log on.. I am all the time getting my password wrong. 5 or 6 times in a row.

BTW: My husbands account was hit today. 2 characters in GToB.. lost uncustomized torment staff and 400K. In its place he got a fungal wallow.. Oh Goody!

So far, my account is safe.. for the time being...or it was 30 minutes ago. Hes not happy and neither am I...I got him a new staff (aint I sweet)...just hope its still there in the morning. This time he customized it.

Best of luck to us all on hanging on to our stuff. Just like a lot of folks here, he changed password, did all the usual precautions and still got hit.

Taco Fiend Taco

Ascalonian Squire

Join Date: Feb 2009

I've been getting a lot of d/c's and err since the weekend too. It almost never happened before that. It has made me quite nervous about things.

Also, I read the whole string but can't remember if this was mentioned...one commonality in this is it appears everybody has a guru account. At least I haven't seen anywhere else an explosion of complaints about 'I wuz hacked'.

Shasgaliel

Shasgaliel

Jungle Guide

Join Date: Apr 2008

[bomb]

Quote:
Originally Posted by Taco Fiend Taco View Post
I've been getting a lot of d/c's and err since the weekend too. It almost never happened before that. It has made me quite nervous about things.

Also, I read the whole string but can't remember if this was mentioned...one commonality in this is it appears everybody has a guru account. At least I haven't seen anywhere else an explosion of complaints about 'I wuz hacked'.
So how can you post "I was attacked" on guru without guru account? No further comments.

My guildie was hacked and he has no guru account and no GWO account etc. He has Ncsoft account though.

refer

refer

Jungle Guide

Join Date: Jan 2009

US

Guild Wars needs a logging method of ALL trades... with who, what, and when.

fusa

fusa

Krytan Explorer

Join Date: Mar 2007

Anet does keep logs of trades as well as chat in game. This is why they want to know the outpost, district, and time when a ticket is submitted. It helps narrow down the search for relevant logs of the incident. The reason no items can be replaced is because it can be easily exploited. Since only a very small number of people have been hacked, its not Guru or NCSoft's web site's security, its the people who were hacked.