home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,582 of 2,445   
   Mike Powell to All   
   MS says Russian hackers a   
   01 Aug 25 07:23:19   
   
   TZUTC: -0500   
   MSGID: 1316.consprcy@1:2320/105 2cf1ecdb   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Microsoft says Russian hackers are planting fake antivirus software in    
   embassy attacks   
      
   Date:   
   Fri, 01 Aug 2025 10:28:44 +0000   
      
   Description:   
   The hackers are using custom malware to target foreign governments.   
      
   FULL STORY   
      
   Foreign embassies in Moscow are being targeted by Russian state hackers, who   
   are using custom malware tracked as ApolloShadow, disguised as Kaspersky   
   antivirus software , new reports have claimed.    
      
   The attacks have the end goal of installing a TLS root certificate which   
   allows the threat actor to cryptographically impersonate trusted websites   
   visited by the infected system inside the embassy, Microsoft Threat   
   Intelligence reports.    
      
   This campaign, which has been ongoing since at least 2024, poses a high risk   
   to foreign embassies, diplomatic entities, and other sensitive organizations   
   operating in Moscow, particularly to those entities who rely on local    
   internet providers," the experts noted.   
      
   Secret Blizzard    
      
   This cyber espionage campaign targeting diplomats and embassies uses what's   
   known as an adversary-in-the-middle (AiTM) attack, which occurs when hackers   
   intercept and alter communications between two parties without their   
   knowledge.    
      
   These frequently leverage other attack vectors like social engineering emails   
   or messages to create conditions in which an attacker can intercept and   
   manipulate the communications between users and the legitimate services they   
   use, then stealing credentials and authenticated access tokens.    
      
   The notorious threat actor, Secret Blizzard, has previously been observed   
   hacking Ukrainian military tech by stealing points of entry from    
   third-parties . The group is one of the most sophisticated and most prolific   
   state-sponsored threat actors in the world.    
      
   Microsoft previously assessed with low confidence that Secret Blizzard was   
   conducting cyberespionage within Russian borders against its adversaries, but   
   the company now confirms that they have the capability to carry these out on   
   the Internet Service Provider (ISP) level.    
      
   This means diplomats using local ISP or telecommunications within Russia are   
   highly likely targets of Secret Blizzards AiTM position within those    
   services.    
      
   In our previous blog, we reported the actor likely leverages Russias domestic   
   intercept systems such as the System for Operative Investigative Activities   
   (SORM), which we assess may be integral in facilitating the actors current   
   AiTM activity, judging from the large-scale nature of these operations,   
   Microsoft confirmed.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/microsoft-says-russian-hackers-are-plan   
   ting-fake-antivirus-software-in-embassy-attacks   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca