nybbler905



Offline



Activity: 213

Merit: 100









Full MemberActivity: 213Merit: 100

Re: [8500 GH/s] Slush's Pool (mining.bitcoin.cz); TX FEES + UserDiff; ASIC tested April 24, 2013, 01:10:58 AM #6641 Nice work getting control back ( took me a while to read all that happened in the last 2 hours since i was on getwork and my pc had to restart due to a breaker blowing... Darn you pressure washers on the same circuit!!!! )



Would not hurt to open the confirm mail and check to see if, in the full headder, there is any Blind Carbon Copy sends which would mean that the whole server system may have been compromised and Slush's server was the most tasty treat to get at first.



Didn't do a reverse DNS to see who/where the host is but.... have a friend that was IT for schools in Alberta and he showed me how easy it was to monitor ANY mail in the schools from one of the IT desktops and ' force ' it to do blind carbon copies. Technically not in the server room, but in the base domain addresses ( for those at home, same side of the router ).



My personal experience in this kind of attack is usually reading about it in forums....



Hope this is the last of it and I'm 1/10th of the way to a half decent GPU mining card and hope to get decent hash/shares soon.