Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,237 of 2,445    |
|    Mike Powell to All    |
|    Operation Endgame follow-    |
|    11 Apr 25 10:10:00    |
      TZUTC: -0500       MSGID: 968.consprcy@1:2320/105 2c5e6b94       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       Operation Endgame follow-up leads to detentions across Smoakloader ecosystem              Date:       Thu, 10 Apr 2025 15:30:00 +0000              Description:       Smokeloader customers were arrested, and their homes searched in a follow-up       to the 2024 Operation Endgame.              FULL STORY              In a follow-up to its May 2024 botnet takedown operation codenamed Operation       Endgame, Europol said it made multiple arrests.               Last year, the European law enforcement agency, together with a number of       national partners, shut down some of the biggest malware droppers, including       IcedID, SystemBC, Pikabot, Smokeloader, and Bumblebee. The operation spanned       numerous countries and multiple continents.               Now, in a press release published on the Europol website, it was said that        the operation continued, but this time against customers of Smokeloader.               New actions               Smokeloader is a pay-per-install malware loader, in which cybercriminals pay       to use the service (which has already infected numerous devices) and drop       their own malware. Europol said criminals used Smokeloader for keylogging,       webcam access, ransomware deployment, cryptomining, and more.               Law enforcement tracked down the customers as they were registered in a       database seized during Operation Endgame, Europol explained, saying these       people now faced house searches, arrest warrants or knock and talks.               It did not discuss the number of people involved, but it did say that several       suspects cooperated with the authorities by facilitating the examination of       their digital devices. Several other suspects admitted to have resold the       Smokeloader services at a markup.               Just like in Operation Endgame, multiple law enforcement agencies were       involved in the follow-up, including the FBI, Secret Service, the DoD, DCIS,       Royal Canadian Mounted Police (RCMP), Czech police, Danish police, French       National Police, Germanys Federal Criminal Police Office, Prosecutor Generals       Office Frankfurt am Main Cyber Crime Center, The Netherlands National       Investigations and Special Operations, and The Netherlands Police.               The agency also said that the operation has not yet concluded and that new       actions will soon be announced on the website operation-endgame.com.               Anyone with information is invited to contact the authorities through this       website, it said. In addition, suspects involved in these and other botnets,       who have not yet been arrested, will be held directly accountable for their       actions.              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/operation-endgame-follow-up-leads-to-de       tentions-across-smoakloader-ecosystem              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca