home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,476 of 2,445   
   Mike Powell to All   
   China-backed "LapDogs" ha   
   29 Jun 25 09:17:00   
   
   TZUTC: -0500   
   MSGID: 1210.consprcy@1:2320/105 2cc68681   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   China-backed "LapDogs" hackers hijacked hundreds of devices in an outlandish   
   intel campaign aimed at US and Asian targets   
      
   Date:   
   Sun, 29 Jun 2025 09:23:00 +0000   
      
   Description:   
   LapDogs is a China-linked espionage operation exploiting SOHO devices to gain   
   stealthy access across the US and Asia, using spoofed credentials and   
   persistent malware.   
      
   FULL STORY   
      
   A recently disclosed cyber espionage operation, dubbed LapDogs, has drawn   
   scrutiny following revelations from SecurityScorecards Strike Team.    
      
   The operation, believed to be conducted by China-aligned threat actors, has   
   quietly infiltrated over 1,000 devices across the United States, Japan, South   
   Korea, Taiwan, and Hong Kong.    
      
   What makes this campaign distinctive is its use of hijacked SOHO routers and   
   IoT hardware, transforming them into Operational Relay Boxes (ORBs) for   
   sustained surveillance.   
      
   Stealth, persistence, and false identities    
      
   LapDogs is an ongoing campaign, active since September 2023, targeting real   
   estate, media, municipal, and IT sectors.    
      
   Devices from known vendors such as Buffalo Technology and Ruckus Wireless    
   have reportedly been compromised.    
      
   The attackers use a custom backdoor named ShortLeash, which grants extensive   
   privileges and stealth, allowing them to blend in with legitimate traffic.    
      
   According to the report, once a device is infected, it may go undetected for   
   months, and in worst-case scenarios, some are used as gateways to infiltrate   
   internal networks.    
      
   Unlike typical botnets that prioritize disruption or spam, LapDogs reveals a   
   more surgical approach.    
      
   LapDogs reflects a strategic shift in how cyber threat actors are leveraging   
   distributed, low-visibility devices to gain persistent access, said Ryan   
   Sherstobitoff, Chief Threat Intelligence Officer at SecurityScorecard.    
      
   These arent opportunistic smash-and-grab attacksthese are deliberate,   
   geo-targeted campaigns that erode the value of traditional IOCs (Indicators    
   of Compromise).    
      
   With 162 distinct intrusion sets already mapped, the structure of the   
   operation suggests clear intent and segmentation.    
      
   What is especially unsettling is the spoofing of legitimate security   
   credentials.    
      
   The malware fabricates TLS certificates appearing to be signed by the Los   
   Angeles Police Department.    
      
   This forgery, combined with geolocation-aware certificate issuance and   
   assigned ports, makes it extremely difficult for conventional detection   
   systems to flag malicious behavior.    
      
   Even the best endpoint protection tools would be challenged in spotting such   
   well-disguised intrusions, especially when activity is routed through   
   compromised home routers rather than enterprise assets.    
      
    SecurityScorecard compares LapDogs with PolarEdge, another China-linked ORB   
   system, but emphasizes that the two are distinct in infrastructure and   
   execution.    
      
   The broader concern raised is the expanding vulnerability landscape. As   
   businesses rely more on decentralized devices and fail to update embedded   
   firmware, the risk of persistent espionage increases.    
      
   The report calls on network defenders and ISPs to review devices across their   
   supply chains.    
      
   SecurityScorecard compares LapDogs with PolarEdge, another China-linked ORB   
   system, but emphasizes that the two are distinct in infrastructure and   
   execution.    
      
   The broader concern raised is the expanding vulnerability landscape. As   
   businesses rely more on decentralized devices and fail to update embedded   
   firmware, the risk of persistent espionage increases.    
      
   The report calls on network defenders and ISPs to review devices across their   
   supply chains.    
      
   This means there is a need to reconsider reactive solutions and focus on more   
   proactive infrastructure-level measures, such as the best FWAAS and best ZTNA   
   solution deployments.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/china-backed-lapdogs-hackers-hijacked-h   
   undreds-of-devices-in-an-outlandish-intel-campaign-aimed-at-us-and-asian-targe   
   ts   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 114 206 300 307 317 400 426 428   
   SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200   
   SEEN-BY: 396/45 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca