Post
Topic
Board Pools
Re: [8500 GH/s] Slush's Pool (mining.bitcoin.cz); TX FEES + UserDiff; ASIC tested
by
TiborB
on 24/04/2013, 00:21:48 UTC
Also, just as an FYI, i do network security in a completely different sector, but the attacks are usually the same.  The "sneak forwarding" is a common targeted attack.

I cross-checked my mailbox setup and no forwarding is configured here. For now I fully blame OVH for this issue.

Interesting analysis.  Is it possible that the algo for the OTP is "known" ?  So the attacker would simply have to know what the next OTP password is once it's been submitted?

I'd guess he is using a vasco or rsa token with appropriate key size...