Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,300 of 2,445    |
|    Mike Powell to All    |
|    Over 1.6 million customer    |
|    17 Apr 25 17:17:00    |
      TZUTC: -0500       MSGID: 1033.consprcy@1:2320/105 2c66b81c       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       Over 1.6 million customers now hit in massive insurance data breach - how to       check if you're one of them              Date:       Thu, 17 Apr 2025 11:27:10 +0000              Description:       Initial reports said around 800,000 individuals were affected, but real        number is now thought to be double that.              FULL STORY              More than 1.6 million people are now thought to have been affected by the May       2024 cyberattack at Landmark Admin, twice as many as originally thought.               The company confirmed the news in an updated report filed with the Office of       the Maine Attorney General.               The forensic investigation determined that data was encrypted and exfiltrated       from Landmarks system, the company said. However, there was insufficient       evidence available to identify which files had been compromised. The       unauthorized activity occurred between May 13, 2024, and June 17, 2024.               Landmark Admin is a third-party administrator (TPA) specializing in       administrative support services for life insurance and annuity companies.               In late October 2024, the company reported suffering a serious ransomware       attack in which threat actors also stole sensitive customer data, with the       attack allegedly the work of a ransomware operator called Abyss.               Following the breach, Landmark Admin shut down its IT systems and remote       access to its network to contain the effects, and brought in third-party       security experts, who found the personal information of 806,519 people had       been stolen.               In a data breach notification letter sent to affected customers, Landmark       Admin said that the information stolen included peoples full names,        addresses, Social Security numbers, tax identification numbers, drivers       license numbers, state-issued ID card numbers, passport numbers, financial       account numbers, medical information, dates of birth, health insurance policy       numbers, and life annuity policy information.               The information stolen varied from individual to individual, and since the       information stolen is highly sensitive, users were advised to be extra       vigilant for potential phishing attacks, social engineering, or possible wire       fraud.               At the time of the breach, Landmark offered credit monitoring and identity       theft protection services through IDX, including 12 months of credit and       CyberScan monitoring, a $1,000,000 insurance reimbursement policy, and fully       managed ID theft recovery services.                Via BleepingComputer              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/over-1-6-million-customers-now-hit-in-m       assive-insurance-data-breach-how-to-check-if-youre-one-of-them              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca