Hacking Team: It is possible to decipher transactions with Bitcoin

Η διαρροή δεδομένων της Hacking Team απέφερε πολύ περισσότερες πληροφορίες από όσες νομίζαμε αρχικά. Τα εσωτερικά emails που διέρρευσαν αποκάλυψαν ότι η εταιρεία είχε αναπτύξει ένα ειδικό λογισμικό που μπορούσε να αποκρυπτογραφήσει κάθε συναλλαγή με Bitcoin, σύμφωνα με μια δημοσίευση του Ars .security Hacking Team

The software in question is called “Money Module” and was part of the suite Control System that the Italian company sold to governments and hacking groups around the world.

As you may know, the Hacking Team was violated in early July, and leaked over 400GB company data.

This data was released online via Wikileaks, and security experts immediately began researching the content, discovering numerous Flash vulnerabilities and more that constituted the company's .

The Money Module, aimed at trading with Bitcoin and was released on January 12, 2014. Developed in Milan (Italy) at a branch of the company and "Allows the collection of various items, such as contact list and local accounts, wallet ( that is, money) and transaction history ”

The Money Module could be used on all operating systems, and it worked perfectly with BitCoins, LiteCoins, Feathercoins, and Namecoins.

Hacking Team's Money Module worked with the of the victim's wallet.dat file, and together with various other keylogging systems of the company, could provide the necessary authentication for decryption and data extraction.

The wallet.dat file contains information about private of the user, which hackers could associate with public transactions. Thus Hacking Team was able to decrypt both ends of a Bitcoin transaction.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).