Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,227 of 2,445    |
|    Mike Powell to All    |
|    AkiraBot network hits tho    |
|    10 Apr 25 10:03:00    |
      TZUTC: -0500       MSGID: 958.consprcy@1:2320/105 2c5d1969       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       AkiraBot network hits thousands of sites with CAPTCHA bypassing AI spam              Date:       Thu, 10 Apr 2025 10:30:00 +0000              Description:       Tens of thousands of websites were served spam messages in chat, comment       sections, and more.              FULL STORY              A major spam campaign leveraging ChatGPT targeted more than 400,000 websites       and successfully spammed 80,000, even working around CAPTCHA filters to       advertise shady services.               This is according to cybersecurity researchers SentinelOne, who discovered        the campaign and recently wrote an in-depth report about it.               As per the report, at the center of the campaign is a platform called        AkiraBot that targets website chats, comment sections, and contact forms. It       is not related to the ransomware operation of the same name.               Cracking CAPTCHA               It is a Python-based framework which uses an OpenAI API to create spam       contents related to the general purpose of the website being targeted. The       goal of the campaign is to advertise two dubious search engine optimization       (SEO) services, called Akira and ServicewrapGO.               What makes this spam campaign stand out is the way it works around CAPTCHA       spam filters.               The bot creator has invested significant effort into evading CAPTCHA filters       as well as avoiding network detections by relying on a proxy service        generally marketed towards advertisersthough the service has had considerable       interest and use by cybercriminal actors, the researchers said in their       report.               To bypass CAPTCHA, the bot uses fake web browsers that mimic a real persons       browser behavior. It does this using a tool called Selenium, which is capable       of opening websites and clicking around.               Since websites can usually spot fake browsers (by hunting for clues such as       missing fonts, mismatched browser info, etc.), the bot injects special code       (inject.js) into the website as it loads. This code tweaks how the fake       browser looks, making it seem more human.               If this browser trick still doesnt fool the CAPTCHA, the bot then uses       external CAPTCHA-solving services (like Capsolver) to crack it. It even       targets chat systems on websites (like Reamaze) to refresh tokens and keep       spamming undetected.               SentinelOne believes AkiraBot has been in use since at least September 2024,       targeting GoDaddy, Wix, Squarespace, and other websites.               According to The Hacker News, OpenAI has disabled the API key and other       associated assets the threat actors used, to tackle the threat.               "The author or authors have invested significant effort in this bot's ability       to bypass commonly used CAPTCHA technologies, which demonstrates that the       operators are motivated to violate service provider protections," the       researchers said.               "AkiraBot's use of LLM-generated spam message content demonstrates the       emerging challenges that AI poses to defending websites against spam        attacks."                Via The Hacker News              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/akirabot-network-hits-thousands-of-site       s-with-captcha-bypassing-ai-spam              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca