My first comment here I couldn’t get my post to submit on reddit (don’t like Tor IP?)

I was browsing X on my phone searching for monero tags to catch up on news and it popped up on my feed no likes no shares. Real or fake? Wth is this antidarknet stuff? Something monero developers should be informed about or nah? anyone tried it?

I couldn’t submit to archive.org the link here’s what it said

Monero 0-day. The Black Marble Attack. How we did it

https://antidark.net/board/viewtopic.php?t=10

#monero #darknet #darkweb #moretocome

??

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    2
    ·
    edit-2
    4 months ago

    It doesn’t seem actionable. They spent 30,000 US to generate a bunch of traffic, which slowed down transactions. Well I don’t appreciate the sentiment, these attacks help evolve the network infrastructure to become resilient

    https://tx.town/v/xmr/launch

    If you want a visualization on the transaction backlog

    • joe8961@monero.townOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 months ago

      How can it be not actionable but slow down transactions too? I remember when i wasn’t able to submit transactions for many hours on end. Wasn’t the black marble attack exactly slowing down transaction? seems contradictory to say it wasn’t actionable if its end result? i am confusion

      They claim they’ve made-off several illegal markets over 300k i mean that’s a 10x investment don’t know if they care about the initial 30 grand lol

      I totally agree resilience is needed on monero and if it’s how the attacks were done it could give developers insight how to fix it. Almost seems like a simulation where many more people would use xmr. More confusion should we thank them or tell them to go f themselves??

      • admin@monero.townM
        link
        fedilink
        arrow-up
        4
        ·
        4 months ago

        This attack highlighted several issues that have been addressed. The biggest issue was wallets not automatically raising the default fee which led to transactions getting stuck for hours. Without the bug, you would have paid 2 cents instead of 0.5 for a transaction and it would have been confirmed at regular speed.

        • joe8961@monero.townOP
          link
          fedilink
          English
          arrow-up
          2
          ·
          4 months ago

          What you’re saying is it’s a legitimate attack at the time of executing pre-new build that fixes the bug? Not a fake and they could’ve really made money exploiting it in badly coded illegal markets? Thanks for clarify

          • admin@monero.townM
            link
            fedilink
            arrow-up
            3
            arrow-down
            1
            ·
            4 months ago

            They made money through extortion, not by draining any wallets due to spam. There was spam and it did delay transactions for regular users due to existing wallet bugs that are now fixed. I can’t really comment on badly coded markets, I assume they somehow broke their payment systems because they didn’t account for long delays when receiving coins or also had the fee selection bug.

            • antidarknet@monero.town
              link
              fedilink
              English
              arrow-up
              4
              arrow-down
              1
              ·
              edit-2
              4 months ago

              Official antidarknet admin here.

              You seem very certain the attack has been “patched” and we made money from “extortion”? Where are you getting your information from while answering with such certainty? Really curious. I’m not being offensive here but is really not good especially for a website admin to make high speculation when they don’t know the facts.

              Let me tell you how it really is and then you and everyone else can draw own conclusions.

              Fact #1

              Although the bug was patched officially it’s still possible to do what we described in the post on our forum. Try it out and see for yourself. Automatically setting the fee doesn’t make the problem go away if you’re 300 blocks or more backlog. As an attacker setting high fees and spamming it DOES create backlog too albeit slower. We do agree it could’ve been the case of the market wallets not being updated hence not being able to send transactions and falling under our exploit scope. Some of our attacks were after the patch was deployed evident by the timeline of certain darknet marketplaces collapsing.

              Fact #2

              We never extorted nobody we simply took it from criminals extortion means something else. You say we “extorted” but in the next sentance you say “they somehow broke their payment systems”? You’re absolutely correct we did break their payment systems but not because they didn’t account for long delays or because we “extorted” them (we never communicated we just did our exploit). But reason being when markets were executing sending payments functions (withdraw for clients) they hadn’t accounted for the sending itself to fail due to the huge backlog we were creating with the spam. Creating an account and depositing then withdrawing while spamming Monero network resulted in getting multiple times the same amount over and over. Simple and honestly newbie programmer mistake not to cover use cases that cost them in total 300k+ and lead to several of them shutting down.

              Fact #3

              Our mission statement is crystal clear. We never took any profit from these attacks. All money were and are being put back into our new projects and operations which are ongoing targetting darknet markets, forums, fraud shops and so on.

              We appreciate the discussion and do hope sincerely the monero devs to be notified, do simulation tests on that stressnet that was build specifically due the attack and see what we’re talking about is not theory in any way and still possible today with enough resources (not talking crazy amounts here less than 100k).

              As a bonus to the developers if you’re reading this is the official wallets are extremely unstable at 200,000 subaccounts if each has had at least one transaction in and one out. Try generating more subaccounts after 200k it takes many times longer to generate rather than when first initializing a wallet. The more accounts you add the slower it gets. Should probably fix that too. Don’t take our word for it but test it yourselves.

              We fight the illegal use and not against privacy featured coins like Monero that’s why we’re sharing all of it. We did indeed use it and possibly cost inconvenience to users however taking down illegal markets where hardcore substances are sold is a priority over making a payment now rather than in half a day.

              Antinet, AntiDarkNet admin

              -----BEGIN PGP SIGNED MESSAGE-----
              Hash: SHA256
              
              Official antidarknet admin here.
              
              You seem very certain the attack has been "patched" and we made money from "extortion"? Where are you getting your information from while answering with such certainty? Really curious. I'm not being offensive here but is really not good especially for a website admin to make high speculation when they don't know the facts.
              
              Let me tell you how it really is and then you and everyone else can draw own conclusions.
              
              
              Fact #1
              
              Although the bug was patched officially it's still possible to do what we described in the post on our forum. Try it out and see for yourself. Automatically setting the fee doesn't make the problem go away if you're 300 blocks or more backlog. As an attacker setting high fees and spamming it DOES create backlog too albeit slower. We do agree it could've been the case of the market wallets not being updated hence not being able to send transactions and falling under our exploit scope. Some of our attacks were after the patch was deployed evident by the timeline of certain darknet marketplaces collapsing. 
              
              
              Fact #2
              
              We never extorted nobody we simply took it from criminals extortion means something else. You say we "extorted" but in the next sentance you say "they somehow broke their payment systems"? You're absolutely correct we did break their payment systems but not because they didn't account for long delays or because we "extorted" them (we never communicated we just did our exploit). But reason being when markets were executing sending payments functions (withdraw for clients) they hadn't accounted for the sending itself to fail due to the huge backlog we were creating with the spam. Creating an account and depositing then withdrawing while spamming Monero network resulted in getting multiple times the same amount over and over. Simple and honestly newbie programmer mistake not to cover use cases that cost them in total 300k+ and lead to several of them shutting down.
              
              
              Fact #3
              
              Our mission statement is crystal clear. We never took any profit from these attacks. All money were and are being put back into our new projects and operations which are ongoing targetting darknet markets, forums, fraud shops and so on.
              
              
              We appreciate the discussion and do hope sincerely the monero devs to be notified, do simulation tests on that stressnet that was build specifically due the attack and see what we're talking about is not theory in any way and still possible today with enough resources (not talking crazy amounts here less than 100k).
              
              As a bonus to the developers if you're reading this is the official wallets are extremely unstable at 200,000 subaccounts if each has had at least one transaction in and one out. Try generating more subaccounts after 200k it takes many times longer to generate rather than when first initializing a wallet. The more accounts you add the slower it gets. Should probably fix that too. Don't take our word for it but test it yourselves.
              
              We fight the illegal use and not against privacy featured coins like Monero that's why we're sharing all of it. We did indeed use it and possibly cost inconvenience to users however taking down illegal markets where hardcore substances are sold is a priority over making a payment now rather than in half a day.
              
              
              Antinet,
              AntiDarkNet admin
              -----BEGIN PGP SIGNATURE-----
              
              iHUEARYIAB0WIQR/iAQxtllG0fCl//MAuh7Std/C3gUCZqJrvgAKCRAAuh7Std/C
              3h8SAQDInTE6L6bmaVEzikzWM/9KwDkWspo0KLAwjQNlDyIQUAD/VkM/wHhEL3Sk
              Tzt/c/UW1pQdONhXT5JI2wkFd4FkjA8=
              =vFU7
              -----END PGP SIGNATURE-----
              
              
              • admin@monero.townM
                link
                fedilink
                arrow-up
                5
                ·
                4 months ago

                Yeah sorry, I had not considered draining market wallets as an option. Thanks for the pentest, it greatly pushed FCMPs and high-throughput research forward!

              • tusker@monero.town
                link
                fedilink
                arrow-up
                3
                ·
                4 months ago

                Thank you for helping to make Monero the best digital cash it can be for me to use on whatever I want.

                The publicity you generated with this is worth at least 1000 XMR, keep at it! 😍

            • joe8961@monero.townOP
              link
              fedilink
              English
              arrow-up
              2
              ·
              4 months ago

              I’m seriously getting confused here sorry how didn’t they make money with the attack but through extortion? Did they break payment systems with monero slowdown or they slowed down monero and extorted money or they extorted money not to attack the monero network? I cant find what you’re referencing to

              If they were able to use it as attack doesn’t that make it actionable and jet who commented wrong?

              • admin@monero.townM
                link
                fedilink
                arrow-up
                4
                ·
                4 months ago

                I was wrong, I didn’t consider that their attack could drain badly coded DNM wallets by double-spending withdraw transactions.