home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,237 of 2,445   
   Mike Powell to All   
   Operation Endgame follow-   
   11 Apr 25 10:10:00   
   
   TZUTC: -0500   
   MSGID: 968.consprcy@1:2320/105 2c5e6b94   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Operation Endgame follow-up leads to detentions across Smoakloader ecosystem   
      
   Date:   
   Thu, 10 Apr 2025 15:30:00 +0000   
      
   Description:   
   Smokeloader customers were arrested, and their homes searched in a follow-up   
   to the 2024 Operation Endgame.   
      
   FULL STORY   
      
   In a follow-up to its May 2024 botnet takedown operation codenamed Operation   
   Endgame, Europol said it made multiple arrests.    
      
   Last year, the European law enforcement agency, together with a number of   
   national partners, shut down some of the biggest malware droppers, including   
   IcedID, SystemBC, Pikabot, Smokeloader, and Bumblebee. The operation spanned   
   numerous countries and multiple continents.    
      
   Now, in a press release published on the Europol website, it was said that    
   the operation continued, but this time against customers of Smokeloader.    
      
   New actions    
      
   Smokeloader is a pay-per-install malware loader, in which cybercriminals pay   
   to use the service (which has already infected numerous devices) and drop   
   their own malware. Europol said criminals used Smokeloader for keylogging,   
   webcam access, ransomware deployment, cryptomining, and more.    
      
   Law enforcement tracked down the customers as they were registered in a   
   database seized during Operation Endgame, Europol explained, saying these   
   people now faced house searches, arrest warrants or knock and talks.    
      
   It did not discuss the number of people involved, but it did say that several   
   suspects cooperated with the authorities by facilitating the examination of   
   their digital devices. Several other suspects admitted to have resold the   
   Smokeloader services at a markup.    
      
   Just like in Operation Endgame, multiple law enforcement agencies were   
   involved in the follow-up, including the FBI, Secret Service, the DoD, DCIS,   
   Royal Canadian Mounted Police (RCMP), Czech police, Danish police, French   
   National Police, Germanys Federal Criminal Police Office, Prosecutor Generals   
   Office Frankfurt am Main  Cyber Crime Center, The Netherlands National   
   Investigations and Special Operations, and The Netherlands Police.    
      
   The agency also said that the operation has not yet concluded and that new   
   actions will soon be announced on the website operation-endgame.com.    
      
   Anyone with information is invited to contact the authorities through this   
   website, it said. In addition, suspects involved in these and other botnets,   
   who have not yet been arrested, will be held directly accountable for their   
   actions.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/operation-endgame-follow-up-leads-to-de   
   tentions-across-smoakloader-ecosystem   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca