Overflow0X Physical Cryptocurrency Robbery: Difference between revisions
No edit summary |
No edit summary |
||
| Line 1: | Line 1: | ||
{{Imported Case Study|source=https://www.quadrigainitiative.com/casestudy/overflow0xphysicalcryptocurrencyrobbery.php}} | {{Imported Case Study 2|source=https://www.quadrigainitiative.com/casestudy/overflow0xphysicalcryptocurrencyrobbery.php}} | ||
{{Unattributed Sources}} | {{Unattributed Sources}} | ||
Reddit user Overflow0X from Morocco reports having his phone stolen by a physical threat with a knife. Limited details are provided in his account of events in which his phone was taken and presumably used to gain access to his cryptocurrency trading accounts. Because the physical phone was used as his 2-factor authentication, he had it registered without using his name, and he had no backup, nothing could be recovered. | Reddit user Overflow0X from Morocco reports having his phone stolen by a physical threat with a knife. Limited details are provided in his account of events in which his phone was taken and presumably used to gain access to his cryptocurrency trading accounts. Because the physical phone was used as his 2-factor authentication, he had it registered without using his name, and he had no backup, nothing could be recovered. | ||
This exchange or platform is based in Morocco, or the incident targeted people primarily in Morocco. | This exchange or platform is based in Morocco, or the incident targeted people primarily in Morocco.<ref name="reddit-8335" /><ref name="reddit-8956" /><ref name="redditold-8957" /><ref name="reveddit-8958" /><ref name="redditold-8959" /><ref name="redditold-8960" /> | ||
<ref name="reddit-8335" /><ref name="reddit-8956" /><ref name="redditold-8957" /><ref name="reveddit-8958" /><ref name="redditold-8959" /><ref name="redditold-8960" /> | |||
== About Unknown == | == About Unknown == | ||
| Line 61: | Line 60: | ||
!Description | !Description | ||
|- | |- | ||
|July 3rd, 2021 1:33:00 PM | |July 3rd, 2021 1:33:00 PM MDT | ||
|Main Event | |Main Event | ||
|Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here. | |Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here. | ||
| Line 69: | Line 68: | ||
| | | | ||
|} | |} | ||
== Technical Details == | |||
This section includes specific detailed technical analysis of any security breaches which happened. What specific software vulnerabilities contributed to the problem and how were they exploited? | |||
== Total Amount Lost == | == Total Amount Lost == | ||
| Line 88: | Line 90: | ||
== Ongoing Developments == | == Ongoing Developments == | ||
What parts of this case are still remaining to be concluded? | What parts of this case are still remaining to be concluded? | ||
== General Prevention Policies == | |||
== Prevention Policies == | |||
Always keep a backup of 2FA and any access credentials in a safe location. It is recommended that the majority of funds be kept offline in a secure account, not on a hot wallet of a phone or an exchange platform. | Always keep a backup of 2FA and any access credentials in a safe location. It is recommended that the majority of funds be kept offline in a secure account, not on a hot wallet of a phone or an exchange platform. | ||
A large factor in this situation was the questionable legality of owning cryptocurrency in Morocco. The situation could have been avoided or the impact reduced with clear regulation allowing cryptoassets. | A large factor in this situation was the questionable legality of owning cryptocurrency in Morocco. The situation could have been avoided or the impact reduced with clear regulation allowing cryptoassets. | ||
== Individual Prevention Policies == | |||
{{Prevention:Individuals:Placeholder}} | |||
{{Prevention:Individuals:End}} | |||
== Platform Prevention Policies == | |||
{{Prevention:Platforms:Placeholder}} | |||
{{Prevention:Platforms:End}} | |||
== Regulatory Prevention Policies == | |||
{{Prevention:Regulators:Placeholder}} | |||
{{Prevention:Regulators:End}} | |||
== References == | == References == | ||
Latest revision as of 10:28, 3 May 2023
Notice: This page is a freshly imported case study from the original repository. The original content was in a different format, and may not have relevant information for all sections. Please help restructure the content by moving information from the 'About' and 'General Prevention' sections to other sections, and add any missing information or sources you can find. If you are new here, please read General Tutorial on Wikis or Anatomy of a Case Study for help getting started.
Notice: This page contains sources which are not attributed to any text. The unattributed sources follow the initial description. Please assist by visiting each source, reviewing the content, and placing that reference next to any text it can be used to support. Feel free to add any information that you come across which isn't present already. Sources which don't contain any relevant information can be removed. Broken links can be replaced with versions from the Internet Archive. See General Tutorial on Wikis, Anatomy of a Case Study, and/or Citing Your Sources Guide for additional information. Thanks for your help!
Reddit user Overflow0X from Morocco reports having his phone stolen by a physical threat with a knife. Limited details are provided in his account of events in which his phone was taken and presumably used to gain access to his cryptocurrency trading accounts. Because the physical phone was used as his 2-factor authentication, he had it registered without using his name, and he had no backup, nothing could be recovered.
This exchange or platform is based in Morocco, or the incident targeted people primarily in Morocco.[1][2][3][4][5][6]
About Unknown
"I live in a third world country and for the many tourists that come here, heads up, it's Morocco." "I use my phone for crypto and online banking since I do some freelancing. I have been DCAing for a few months now, and I had Google Authenticator and SIM authentication as 2FA."
"My phone was locked at the moment it was stolen, I was able to call it a few times before probably they removed the SIM card. Of course the SIM card was stolen as well, and since I wanted it to be not known to many people or even under my name, I could not get it back from the agency."
"I always knew the phone number is not a safe option for 2FA, not only because of SIM swaps, but also as in my case: Phone number with no name and only 1 phone call I remember I did on it this month (My agency requires at to provide at least 3 phone numbers I have dialed this month - 1, my father). Don't use your phone number as 2FA, and consider having your name under your card (I could not as Crypto trading is not allowed in my country)."
"It has been a rough week, and the moment I started thinking things are going to be okay, I had these two guys steal my phone under the threat of a weapon (knife) this midday." "I have been robbed physically under the threat of a weapon last week." "It was a very stressful week, then the moment it started to cool of a bit, they stepped in." "I don't have many people to tell this to, and I would not anyway as they'd not get it (they think Crypto is a scam as a whole, not just shitcoins)."
"I know one should not reveal where they're from on platforms like Reddit, but since I know tourists who were robbed here as well, I hate to see it happen. I am no tourist and I steal got robbed."
"I know using phone number as a 2FA is not safe because of the SIM swaps, but ironically I can't get my phone number back. I have filled a police statement one hour after that, but I don't think they could do anything about it, as again, my fault, I never saved my phone's IMEI number (and since they official country's stand on crypto is not so good, I would not want them to be able to anyways, I guess, so why)"
"I have the 16 character long Google Authenticator which I believe I should input into a new Google Authenticator app, but as of now, I cannot get a new phone as things are tight."
"I don't know if my words are coherent, I can't focus. This may not be a big deal to most investors here, but for those who are just trying to get buy, it leaves a mark. I look forward your thoughts and pieces of advice."
"I despise theft and scammers." "I from the bottom of my heart wish I meet the scums who robbed me someday." "The police are retarded. Don't get your hopes up." "I [now] carry a hammer in my back pack." "[A] hammer around is a good safety much better then a knife!"
This exchange or platform is based in Morocco, or the incident targeted people primarily in Morocco.
The background of the exchange platform, service, or individuals involved, as it would have been seen or understood at the time of the events.
Include:
- Known history of when and how the service was started.
- What problems does the company or service claim to solve?
- What marketing materials were used by the firm or business?
- Audits performed, and excerpts that may have been included.
- Business registration documents shown (fake or legitimate).
- How were people recruited to participate?
- Public warnings and announcements prior to the event.
Don't Include:
- Any wording which directly states or implies that the business is/was illegitimate, or that a vulnerability existed.
- Anything that wasn't reasonably knowable at the time of the event.
There could be more than one section here. If the same platform is involved with multiple incidents, then it can be linked to a main article page.
The Reality
This sections is included if a case involved deception or information that was unknown at the time. Examples include:
- When the service was actually started (if different than the "official story").
- Who actually ran a service and their own personal history.
- How the service was structured behind the scenes. (For example, there was no "trading bot".)
- Details of what audits reported and how vulnerabilities were missed during auditing.
What Happened
The specific events of the loss and how it came about. What actually happened to cause the loss and some of the events leading up to it.
| Date | Event | Description |
|---|---|---|
| July 3rd, 2021 1:33:00 PM MDT | Main Event | Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here. |
Technical Details
This section includes specific detailed technical analysis of any security breaches which happened. What specific software vulnerabilities contributed to the problem and how were they exploited?
Total Amount Lost
The total amount lost is unknown.
How much was lost and how was it calculated? If there are conflicting reports, which are accurate and where does the discrepancy lie?
Immediate Reactions
How did the various parties involved (firm, platform, management, and/or affected individual(s)) deal with the events? Were services shut down? Were announcements made? Were groups formed?
Ultimate Outcome
What was the end result? Was any investigation done? Were any individuals prosecuted? Was there a lawsuit? Was any tracing done?
Total Amount Recovered
There do not appear to have been any funds recovered in this case.
What funds were recovered? What funds were reimbursed for those affected users?
Ongoing Developments
What parts of this case are still remaining to be concluded?
General Prevention Policies
Always keep a backup of 2FA and any access credentials in a safe location. It is recommended that the majority of funds be kept offline in a secure account, not on a hot wallet of a phone or an exchange platform.
A large factor in this situation was the questionable legality of owning cryptocurrency in Morocco. The situation could have been avoided or the impact reduced with clear regulation allowing cryptoassets.
Individual Prevention Policies
No specific policies for individual prevention have yet been identified in this case.
For the full list of how to protect your funds as an individual, check our Prevention Policies for Individuals guide.
Platform Prevention Policies
Policies for platforms to take to prevent this situation have not yet been selected in this case.
For the full list of how to protect your funds as a financial service, check our Prevention Policies for Platforms guide.
Regulatory Prevention Policies
No specific regulatory policies have yet been identified in this case.
For the full list of regulatory policies that can prevent loss, check our Prevention Policies for Regulators guide.
References
- ↑ If you want to join me in watching metamask account get robbed by some asshole look below : CryptoCurrency (Jul 3, 2022)
- ↑ If you want to join me in watching metamask account get robbed by some asshole look below : CryptoCurrency (Jul 5, 2022)
- ↑ I had my phone robbed under the treat of weapon today : CryptoCurrency (Sep 1, 2022)
- ↑ reveddit (Sep 1, 2022)
- ↑ Overflow0X comments on Is it illegal to carry a knife in your pocket for self defense purposes ? (Sep 1, 2022)
- ↑ Overflow0X comments on [deleted by user] (Sep 1, 2022)