home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,440 of 2,445   
   Mike Powell to All   
   FBI warns Play ransomware   
   06 Jun 25 09:01:00   
   
   TZUTC: -0500   
   MSGID: 1173.consprcy@1:2320/105 2ca83105   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FBI warns Play ransomware hackers have hit nearly a thousand US firms   
      
   Date:   
   Thu, 05 Jun 2025 14:28:00 +0000   
      
   Description:   
   Play hackers have added phone calls to their extortion tactics, and are   
   targeting more flaws.   
      
   FULL STORY   
      
   Play Ransomwares body count is almost hitting four digits, a new warning from   
   top legal enforcement has revealed, urging businesses to stay on guard    
   against attacks.    
      
   In an updated security advisory, published by the FBI, CISA, and the   
   Australian Signals Directorates Australian Cyber Security Centre (ASDs ACSC),   
   it was said that Play and its affiliates exploited approximately 900    
   entities.    
      
   Play Ransomware, also known as Playcrypt, is an infamous ransomware operator.   
   It is known for using the atypical triple-extortion method in which, besides   
   encrypting and exfiltrating files, it also calls its victims on the phone to   
   convince them to pay up.   
      
   SimpleHelp flaws targeted    
      
   The security agencies security advisory has been updated to reflect changes   
   Play and its affiliates made in recent times. For example, it was said that   
   the victims get a unique @gmx.de, or @web.de email address, through which   
   theyre invited to communicate with the attackers.    
      
   Furthermore, the group seems to have added new vulnerabilities to the ones   
   they were already targeting. Besides FortiOS (CVE-2018-13379, and   
   CVE-2020-12812) and Microsoft Exchange (ProxyNotShell CVE-2022-41040 and   
   CVE-2022-41082) bugs, they are now exploiting CVE-2024-57727 in remote   
   monitoring and management (RMM) tool SimpleHelp, which theyre using for    
   remote code execution (RCE) capabilities.    
      
   This vulnerability was first spotted in mid-January 2025, and has been   
   exploited since.    
      
   To make things even worse, the agencies are saying that the Play ransomware   
   binary is recompiled for every attack, which means it gets a new, unique    
   hash, for each deployment. This complicates anti-malware and antivirus    
   program detection.    
      
   Play was first spotted around 2020, and in the past, was known for targeting   
   Windows-powered devices, but in late July 2024, security researchers saw a   
   Linux variant targeting VMWare ESXi environments.    
      
   In a technical breakdown, Trend Micros Threat Hunting team said at the time   
   that it was the first time Play was seen targeting ESXi environments, and it   
   could be that the criminals are broadening their attacks across the Linux   
   platform.    
      
    Via The Register   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/fbi-warns-play-ransomware-hackers-have-   
   hit-nearly-a-thousand-us-firms   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 114 206 300 307 317 400 426 428   
   SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200   
   SEEN-BY: 396/45 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca