home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,507 of 2,445   
   Mike Powell to All   
   NSA says Volt Typhoon was   
   17 Jul 25 09:09:15   
   
   TZUTC: -0500   
   MSGID: 1240.consprcy@1:2320/105 2cde3ee3   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   NSA says Volt Typhoon was not successful at persisting in critical   
   infrastructure   
      
   Date:   
   Wed, 16 Jul 2025 15:44:00 +0000   
      
   Description:   
   The Chinese threat actor wanted to lurk in the shadows but was effectively   
   ousted, NSA and FBI claim.   
      
   FULL STORY   
      
   Volt Typhoon, a Chinese state-sponsored threat actor which targeted critical   
   US infrastructure, failed to achieve its main objective - to maintain   
   long-term, invisible persistence on key targets.    
      
   This is according to senior cybersecurity officials from the National    
   Security Agency (NSA) and the Federal Bureau of Investigation (FBI).    
      
   Speaking at the recent International Conference on Cyber Security at Fordham   
   University in New York City, the agents discussed the Typhoon campaign as a   
   whole, and confirmed that it was laying groundwork for a potential escalation   
   of conflict over Taiwan.   
      
   No persistence maintained    
      
   The good news is, they really failed. They wanted to persist in domestic   
   networks very quietly for a very long time so that if and when they needed to   
   disrupt those networks, they could. They were not successful in that    
   campaign, said Kristina Walter, director of the NSAs Cybersecurity   
   Collaboration Center.    
      
   We, with private sector, with FBI, found them, understood how they were using   
   the operating systems, how they're using legitimate credentials to maintain   
   persistence, and frankly, we equipped the entire private sector and U.S.   
   government to hunt for them and detect them.    
      
   Being able to breach security systems and access critical infrastructure   
   should be cause for concern in its own right, though.    
      
   In mid-March 2025, it was reported Volt Typhoon had access to Massachusetts   
   Littleton Electric Light and Water Departments (LELWD)s operational    
   technology (OT) network for ten months in 2023. The intrusion lasted from   
   February to November 2023.    
      
   Before that, in January 2025, Volt Typhoon was allegedly targeting the   
   critical infrastructure of small island nation Guam, looking to disrupt and   
   sabotage services in the region, reportedly targeting the GPA (Guam Power   
   Authority) to wreak havoc on the island, which is home to a large US military   
   base.    
      
    Via The Record   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/nsa-says-volt-typhoon-was-not-successfu   
   l-at-persisting-in-critical-infrastructure   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca