home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,620 of 2,445   
   Mike Powell to All   
   Hackers are now mimicking   
   12 Aug 25 09:10:35   
   
   TZUTC: -0500   
   MSGID: 1354.consprcy@1:2320/105 2d0086a5   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Hackers are now mimicking government websites using AI - everything you need   
   to know to stay safe   
      
   Date:   
   Mon, 11 Aug 2025 17:31:00 +0000   
      
   Description:   
   Threat actors replicated two Brazilian government sites using Deepsite AI,    
   and then phished information and stole money.   
      
   FULL STORY   
      
   Experts have warned hackers recently used a generative AI tool to replicate   
   several web pages belonging to the Brazilian government in an effort to steal   
   sensitive personal information and money.    
      
   The fake websites were examined by Zscaler ThreatLabz researchers, who   
   discovered multiple indicators of the use of AI to generate code.    
      
   The websites look almost identical to the official sites, with the hackers   
   using SEO poisoning to make the websites appear higher in search results, and   
   therefore seem more legitimate.   
      
   AI generated government websites    
      
   In the campaign examined by ThreatLabz, two websites were spotted mimicking   
   important government portals. The first was for the State Department of   
   Traffics portal for applying for a drivers license.   
      
   The two sites appear to be near-identical, with the only major difference   
   being in the websites URL. The threat actor used govbrs[.]com as the URL   
   prefix, mimicking the official URL in a way that would be easily overlooked    
   by those visiting the site. The webpage was also boosted in search results   
   using SEO poisoning, making it appear to be the legitimate site.    
      
   Once on the site, the users are invited to enter their CPF number (a form of   
   personal identification number similar to an SSN), which the hacker would   
   authenticate using an API.    
      
   The victim would then fill out a web form asking for personal information    
   such as name and address, before being asked to schedule psychometric and   
   medical exams as part of the driving application.    
      
   The victim would then be prompted to use Pix, Brazils instant payment system,   
   to complete their application. The funds would go directly to the hackers   
   account.    
      
   A second website based on the job board for the Brazilian Ministry of   
   Education lured applicants into handing over their CPF number and completing   
   payments to the hacker. This website used similar URL squatting techniques    
   and SEO poisoning to appear legitimate.    
      
   The user would apply to fake job listings, handing over personal information   
   before again being prompted to use the Pix payment system to complete their   
   application.    
      
   In ThreatLabz technical analysis of both sites, much of the code showed signs   
   of being generated by Deepsite AI using a prompt to copy the official    
   website, such as TailwindCSS styling and highly structured code comments that   
   state In a real implementation    
      
   The CSS files of the website also include templated instructions on how to   
   reproduce the government sites.    
      
   The ThreatLabz blog concludes, While these phishing campaigns are currently   
   stealing relatively small amounts of money from victims, similar attacks can   
   be used to cause far more damage. Organizations can reduce the risk by   
   ensuring best practices along with deploying a Zero Trust architecture to   
   minimize the attack surface.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/hackers-are-now-mimicking-government-we   
   bsites-using-ai-everything-you-need-to-know-to-stay-safe   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca