home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,401 of 2,445   
   Mike Powell to All   
   Instagram, TikTok account   
   20 May 25 08:53:00   
   
   TZUTC: -0500   
   MSGID: 1134.consprcy@1:2320/105 2c91c470   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Instagram and TikTok accounts are being stolen using malicious PyPI packages   
      
   Date:   
   Tue, 20 May 2025 12:43:59 +0000   
      
   Description:   
   Someone's hunting for Instagram and TikTok email accounts and triggering the   
   password reset process.   
      
   FULL STORY   
      
   Security researchers have found some of the tools cybercriminals are using to   
   steal peoples Instagram and TikTok accounts - on PyPI.    
      
   The Python Package Index (PyPI), one of the worlds biggest repositories of   
   Python code, is often abused to holst malicious code, or trick software   
   developers into downloading and running tainted code in their projects.    
      
   In this case, security researchers from Socket found three packages, named   
   checker-SaGaF, steinlurks, and sinnercore. Cumulatively, these three had   
   around 7,000 downloads before being pulled from the platform.    
      
   Credential stuffing and password spraying   
      
   The first two acted as email address validators, cross-referencing supplied   
   email addresses with TikTok and Instagram APIs, to see if they are associated   
   with accounts on the platform. While simply checking if an email address is   
   valid doesnt seem to be particularly harmful, it is an important step in   
   cybercriminal activity, the researchers explained.    
      
   "Once threat actors have this information, just from an email address, they   
   can threaten to dox or spam, conduct fake report attacks to get accounts   
   suspended, or solely confirm target accounts before launching a credential   
   stuffing or password spraying exploit," said Sockets Olivia Brown.    
      
   "Validated user lists are also sold on the dark web for profit. It can seem   
   harmless to construct dictionaries of active emails, but this information   
   enables and accelerates entire attack chains and minimizes detection by only   
   targeting known-valid accounts."    
      
   The third package, sinnercore, triggers the  forgot password  flow for a    
   given username on Instagram.    
      
   The news comes roughly a month after researchers found two malicious packages   
   on PyPI, posing as fixes for a popular, legitimate package. The malware was   
   designed to steal peoples cryptocurrency, which is a popular attack vector on   
   PyPI. In this case, the legitimate package is used in building hot wallets -   
   software wallets for cryptocurrencies. Despite being obvious malware, the two   
   packages still managed to rake in more than 37,000 downloads before being   
   pulled.    
      
    Via The Hacker News   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/instagram-and-tiktok-accounts-are-being   
   -stolen-using-malicious-pypi-packages   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 114 206 300 307 317 400 426 428   
   SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200   
   SEEN-BY: 396/45 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca