Forum Hack at Ethereum – Comeback of a Hacker

It almost seems like you’re not safe from hacks anymore, does it? The day before yesterday, Ethereum announced that hacks had been detected on the Ethereum forum. On December 16th, unauthorized access to the was recorded. The hacker is known from another hack.

Indian Bitcoin exchanges, scammers, phishing attacks. Crime does not stop at technology either. What do we know about the Ethereum forum hack?

Hudson Jameson of Ethereum provided some information about a Bitcoin profit review

What we know: The hacked file is a database backup from April of this year and contains information on about 16,500 forum users. The leased information includes News, both public and private, IP addresses, Usernames and email addresses, profile information, hashed passwords.

~13,000 bcrypt Hashes salted* (* see below)
~1,500 WordPress hashes salted*
~2,000 accounts without password (federated identity: compound identity from already known information)
(!) The attacker expressed himself as the same Bitcoin profit review person who hacked Bo Shen in early December and stole over 280,000 € from the VC
The attacker used social engineering (as he did last time) to get access to a smartphone. From there he had access to other accounts, one of which had access to the old database.
I just put a bold prognosis in the room:

Since the hacker now has access to sensitive data a second time with the same(!) strategy, he won’t stop. And that there are always known goals from the crypto world, it should give us to think.

What countermeasures does Ethereum take against the Bitcoin profit scam?

Affected users of the forum should already have received an e-mail from onlinebetrug with further information. The unauthorized access points should have been closed.

The security guidelines will be increased. Phone numbers are excluded from the Bitcoin profit scam system and sensitive data is encrypted from now on.

If you think you are affected, you can get security on the HaveIBeenpWned website. The possible leaked e-mail addresses can be compared there with the forum’s own e-mail address. In addition, all forum passwords have been reset.

If someone is affected by the attack, James advises the following:

Make sure that you have not used your password anywhere else. If you have used your password from elsewhere, change it immediately.

Questions can also be sent to .

Social Engineering
Behind this high-sounding term stands a practice that every Internet user may have experienced before.

An e-mail that looks exactly like PayPal and asks for sensitive data such as address and password? And then has a cryptic sender?

This form is called phishing and is only one of many social engineering methods to gain the user’s trust and then obtain information.

Administrators will never(!) ask you for passwords. Don’t be unsettled and get all the more sensitive when someone threatens to talk to your supervisor if you don’t cooperate (in fact, this is a famous scam).

Take it easy and be attentive when it comes to sensitive information. Passwords are easily forgotten, that’s right, but it’s still important to use different passwords. If an account is hacked, the attacker can use the found password to crack other services that you use.

\* salted: A hash to which additional random information has been added to increase entropy.