Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,631 of 2,445    |
|    Mike Powell to All    |
|    UK immigration system tar    |
|    14 Aug 25 09:16:57    |
      TZUTC: -0500       MSGID: 1365.consprcy@1:2320/105 2d032b2e       PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       FORMAT: flowed       UK immigration system targeted by hackers - dangerous new phishing campaign       hits Sponsorship Management System              Date:       Thu, 14 Aug 2025 11:04:53 +0000              Description:       Phishing emails are being used to steal account credentials to generate fake       jobs and visa schemes.              FULL STORY              A phishing campaign has been uncovered by Mimecast researchers targeting the       Home Office Sponsorship Management System (SMS).               The main aim of the campaign appear to be to compromise access to accounts,       which can then be sold on the dark web, extorting organizations through the       theft of sensitive data, and creating fraudulent Certificates of Sponsorship       (CoS).               The campaign doesnt just affect organizations with sponsor license        privileges, but threatens to undermine the entire UK immigration system.              UK Home Office at risk              The attackers begin the campaign by sending emails that closely resemble       legitimate emails distributed by the Home Office, using the same branding and       stylization. The emails include an urgent call to action that threatens       account suspension if the user doesnt log in.               The victims are guided to a fake login page via a captcha-gated URL that        looks very similar to the legitimate URL used by the Home Office. After       completing the captcha, the user lands on a cloned Home Office login page.               The only differences between the legitimate and illegitimate pages are in the       form submission. The fake page directs credentials to an attacker-controlled       script, where the exposed credentials can be used to log in to the victims       account.               With the stolen accounts, the attackers can then create fake job offers and       visa sponsorship schemes, and charge victims tens of thousands of pounds to       access them.               The best protection against phishing campaigns such as this one is constant       vigilance. Always double check URLs and be cautious of urgent calls to        action.               ======================================================================       Link to news story:       https://www.techradar.com/pro/security/uk-immigration-system-targeted-by-hacke       rs-dangerous-new-phishing-campaign-hits-sponsorship-management-system              $$       --- SBBSecho 3.28-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca