Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,341 of 2,445    |
|    Mike Powell to All    |
|    Almost a quarter of HTML    |
|    29 Apr 25 09:40:00    |
      TZUTC: -0500       MSGID: 1074.consprcy@1:2320/105 2c761fa1       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       Almost a quarter of HTML attachments are malicious, research finds              Date:       Tue, 29 Apr 2025 12:29:00 +0000              Description:       Attackers are increasingly embedding malicious scripts into HTML files.              FULL STORY              New research from Barracuda has revealed that a staggering 23% of HTML       attachments are marked as malicious, making HTML the most weaponized file        type - making up over three quarters of malicious files detected, despite a       low total volume.               Attackers are increasingly using HTML files for phishing by embedding       malicious scripts to redirect victims to fake login pages that are created in       order to steal credentials or trick users into downloading malware.               The research also shows that PDFs are less likely to be malicious, despite       being the most frequently shared file type via email attachments. Only 0.13%       of PDFs were found to be harmful, but they are starting to more often contain       deceptive links to trick readers onto credential harvesting sites.               Takeover threats              Worryingly, 87% of binaries that were detected were malicious, which outlines       the need for strict policies against executable files being sent through       email. The researchers warn that since executables can directly install       malware , security teams should consider blocking binaries (unless they are       absolutely necessary) and ensure all downloads are scanned before execution.               A fifth of companies experience at least one account takeover incident per       month, with criminals gaining access by exploiting weak or reused passwords ,       phishing, or credential stuffing - all very common tactics that are on the       rise, and hackers are getting better at smuggling phishing emails past       cybersecurity defenses , so be wary.               Of these account takeover attacks, 27% involved a suspicious rule change,        such as auto-deleting incoming security alerts, or setting up email        forwarding to an external address - helping attackers maintain persistence        and avoid detection.               As threats evolve, so should your organizations protection, Barracuda        advises.               Scammers are adapting their tactics to bypass gateways and spam filters, so       its critical to have a solution in place that detects and protects against       targeted phishing attacks. Supplement your gateways with AI-powered cloud       email security technology that doesnt solely rely on looking for malicious       links or attachments.              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/almost-a-quarter-of-html-attachments-ar       e-malicious-research-finds              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca