Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CHAT    |    General havoc    |    1,840 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 521 of 1,840    |
|    August Abolins to Brian Rogers    |
|    Issue with URL shortener    |
|    12 May 21 22:18:00    |
      MSGID: 1:153/757.21@fidonet f05a92c8       REPLY: 9.fidonet_chat@1:142/103 24ffc21c       PID: OpenXP/5.0.49 (Win32)       CHRS: ASCII 1       TZUTC: -0400       Hello Brian!              ** On Tuesday 11.05.21 - 09:52, you wrote:               BR> Or you can use lynx and view the source. That may help as        BR> well.              I'm not too overly concerned anymore about short links. It's        been about 20 yrs now since TinyUrl launched. Weren't they the        first with that idea? Anyway.. They've built a vetting process        into them and block links that have nefarious purposes.              The only thing I won't do is click on a short link from        unsoliced email or if something arrives from someone I do not        know.              I have to wonder if that or a similar technique was used to be        the vector for inviting the ransomeware that shut down the east        coast pipeline.              Krebbs article "A Closer Look at the DarkSide Ransomware Gang       May 11, 2021" talks about the end result of that, but I wonder        what the vector was for infection.              This is a pretty good article that examines the techinal        tricks:              https://securityintelligence.com/posts/darkside-oil-pipeline-        ransomware-attack/              "A favorite entry point appears to be connecting via RDP on        port 443 typically routing via a TOR browser."              And.. I did not know that VPNs and Linux were not immune:              "The malware can attack both Windows and Linux environments,        making enterprise servers just as `encryptable' as an        employee's endpoint. DarkSide can also attack virtual machines        and encrypt data on their hard drives."              Apparently all the activity of making backups is no guarantee        that you could just ignore the ransomeware attack and just        restore an ealier backup. Apparently, the "attack" lurks in        the background for an amount of time that might represent a        typical schedule for several backups - so, when it comes time        to use a previous backup, all those backups will have already        have copies of the infection.       --        ../|ug              --- OpenXP 5.0.49        * Origin: Mobile? Join CHAT here: https://tinyurl.com/y5k7tsla (1:153/757.21)       SEEN-BY: 105/81 129/305 134/100 153/757 7715 229/426 664 700 282/1038       SEEN-BY: 301/1 322/757 342/17       PATH: 153/757 229/664 426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca