home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,523 of 2,445   
   Mike Powell to All   
   MS SharePoint server hack   
   22 Jul 25 10:26:47   
   
   TZUTC: -0500   
   MSGID: 1256.consprcy@1:2320/105 2ce4e89f   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Microsoft SharePoint server hack sees Chinese threat actor hit roughly 100   
   orgs - heres what we know so far   
      
   Date:   
   Tue, 22 Jul 2025 10:51:51 +0000   
      
   Description:   
   A recently discovered SharePoint security flaw has been exploited by threat   
   actors.   
      
   FULL STORY   
      
   A cyberespionage campaign exploiting the recently-revealed Microsoft   
   SharePoint issue has targeted roughly 100 organizations, compromising server   
   software and primarily hitting government agencies in the US and Germany,   
   experts have warned.    
      
   Google released a statement in which it attributed at least some of the   
   attacks to a China-Nexus threat actor, and warned against further expansion    
   of the threat.    
      
   Microsoft recently released urgent security flaw patche s to address a   
   zero-day vulnerability that affected SharePoint servers, which have been   
   abused in attacks since July 18, with victims reportedly including a private   
   energy operator in California as well as a private fintech firm in New York.   
      
   China-Nexus threat actors    
      
   The attacks saw hackers extract cryptographic keys from servers that are run   
   by Microsoft clients. The keys would then let them install pretty much   
   anything - including malware or backdoors that hackers could use to return.    
      
   Only SharePoint versions that are hosted by the customer, rather than the   
   cloud, are vulnerable. These types of attacks could allow attackers to steal   
   corporate secrets or install ransomware to encrypt key files.    
      
   We assess that at least one of the actors responsible for this early   
   exploitation is a China-nexus threat actor said Charles Carmakal, chief   
   technology officer of Googles Mandiant Consulting.    
      
   It's critical to understand that multiple actors are now actively exploiting   
   this vulnerability. We fully anticipate that this trend will continue, as   
   various other threat actors, driven by diverse motivations, will leverage    
   this exploit as well." he continued.    
      
   Researchers say that so far, the attacks can be attributed to a single hacker   
   or a set of hackers, rather than a large number - but there has been a broad   
   range of targets, and a vast number of potential targets - with some   
   researchers estimating up to 8,000 vulnerable servers.    
      
   Whilst the update should prevent new intrusion, users will also need to    
   rotate machine keys, search for any missed breaches, and deploy Antimalware   
   Scan Interface (AMSI) as well as antivirus software .   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/microsoft-sharepoint-server-hack-sees-c   
   hinese-threat-actor-hit-roughly-100-orgs-heres-what-we-know-so-far   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca