Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,017 of 2,445    |
|    Mike Powell to All    |
|    Thousands of websites hav    |
|    29 Mar 25 08:36:00    |
      TZUTC: -0500       MSGID: 742.consprcy@1:2320/105 2c4d32b4       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       Thousands of websites have now been hijacked by this devious, and growing,       malicious scheme              Date:       Fri, 28 Mar 2025 14:02:00 +0000              Description:       Scheme grew from 35,000 websites to 150,000 websites in just a matter of       weeks.              FULL STORY              Security researchers c/side recently reported on a major website hijacking       campaign, in which unnamed threat actors took over 35,000 websites and used       them to redirect visitors to malicious pages and even serve them malware.               Now, a month later, the team has claimed the campaign has scaled even        further, and now compromises a staggering 150,000 websites.               C/side believes the campaign is related to the Megalayer exploit, since its       known for distributing Chinese-language malware , contains the same domain       patterns, and the same obfuscation tactics.               Open redirects              While the method changed slightly, and now comes with a slightly revamped       interface, the gist is still the same, as the attackers use iframe injections       to display a full-screen overlay in the visitors browser.               The overlays show either impersonated legitimate betting websites, or        outright fake gambling pages.               C/side did not detail who the attackers are, other than saying they could be       linked to the Megalayer exploit.               The attackers are most likely Chinese, since theyre coming from regions where       Mandarin is common, and since the final landing pages present gambling        content under the Kaiyun brand.               They also did not discuss how the threat actors managed to compromise these       tens of thousands of websites, but once the attackers gained access, they        used it to inject a malicious script from a list of websites.               Once the script loads, it fully hijacks the users browser window - often       redirecting them to pages promoting a Chinese-language gambling (or casino)       platform, the researchers explained in the previous report.               To mitigate the risk of website takeover, c/side says web admins should audit       their source code, block malicious domains, or use firewall rules for       zuizhongjs[.]com, p11vt3[.]vip, and associated subdomains.               It would also be wise to keep an eye on logs for unexpected outgoing requests       to these domains.              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/thousands-of-websites-have-now-been-hij       acked-by-this-malicious-scheme              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca