Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,456 of 2,445    |
|    Mike Powell to All    |
|    Top Canadian telecom firm    |
|    25 Jun 25 08:25:00    |
      TZUTC: -0500       MSGID: 1189.consprcy@1:2320/105 2cc1346c       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       Top Canadian telecom firms may have been hit by Chinese Salt Typhoon hackers              Date:       Tue, 24 Jun 2025 15:03:00 +0000              Description:       Hackers have seemingly used a Cisco flaw to gain access to telco network.              FULL STORY              The Canadian Centre for Cyber Security, alongside the FBI, have confirmed       hackers were able to gain access to three network devices registered to a       Canadian Telecommunications company.               The Cyber Centre is aware of malicious cyber activities currently targeting       Canadian telecommunications companies. The responsible actors are almost       certainly PRC state-sponsored actors, specifically Salt Typhoon, The Canadian       Centre for Cybersecurity said in a statement.               This isnt unfamiliar territory for Salt Typhoon, as the group compromised at       least eight US telco giants earlier in 2025, with the hackers allegedly        having access to these networks for months in a mass surveillance campaign       affecting dozens of countries and targeting several high-level officials.               A long running campaign              The hackers, apparently exploited a high severity Cisco flaw, tracked as       CVE-2023-20198 to gain access, allowing them to retrieve running        configuration files from the compromised devices, which were then modified in       order to create a GRE tunnel, enabling traffic collection from the network        the devices were connected to.               A patch for this flaw has been available since October 2023, which indicates        a serious security oversight in Canadian Telecom cybersecurity.               The threat actors most likely targeted these devices in order to collect       information from the victims internal network, or use the victims device to       enable the compromise of further victims, which could explain how Salt        Typhoon has been so successful in compromising large organizations.               While our understanding of this activity continues to evolve, we assess that       PRC cyber actors will almost certainly continue to target Canadian       organizations as part of this espionage campaign, including        telecommunications service providers and their clients, over the next two       years, the statement confirms.               Telecommunication companies are a high-priority for threat actors as they       store large amounts of customer data and have useful intelligence value for       cyber-espionage campaigns.                Via: ArsTechnica              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/top-canadian-telecom-firms-may-have-bee       n-hit-by-chinese-salt-typhoon-hackers              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700       SEEN-BY: 226/30 227/114 229/110 111 114 206 300 307 317 400 426 428       SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200       SEEN-BY: 396/45 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca