Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,699 of 2,445    |
|    Mike Powell to All    |
|    Nevada closes state offic    |
|    27 Aug 25 08:22:36    |
      TZUTC: -0500       MSGID: 1447.consprcy@1:2320/105 2d144243       PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       FORMAT: flowed       Nevada forced to close state government offices following wide-ranging       'network security incident' - here's what we know              Date:       Tue, 26 Aug 2025 16:35:00 +0000              Description:       Websites, offices, and phone lines all unavailable following what appears to       be a cyberattack.              FULL STORY              Offices, websites, and phone lines of the state government of Nevada were all       made unavailable and taken offline following an apparent cyberattack.               The official X account of the Governor Lombardo Press Office posted an       announcement saying the State of Nevada identified a network security       incident.               At the moment this article was written, the website was still offline,       displaying a single message, saying The requested URL was rejected. Please       consult with your administrator.              Was this a ransomware attack?               As the State continues its recovery efforts, the network security incident       continues to impact the availability of certain state technology systems on       the state network, the announcement adds. Some state websites or phone lines       may be slow or briefly unavailable during recovery.               The way the announcement is worded does not suggest this was a cyberattack,       however with multiple services offline, an ongoing investigation, and the       state looking to restore the services one by one, it all bears the markings        of a ransomware attack.               Ransomware attacks also usually include data theft, with criminals       exfiltrating sensitive files to be used as leverage in case the victim can       restore their services via backups.               In this case, however, Nevada says there is currently no evidence that any       personally identifiable information (PII) was compromised.               At press time, no threat actors assumed responsibility for the attack, but       ransomware against US state and local governments has historically been       carried out by financially motivated criminal groups rather than       state-sponsored actors.               Some of the better-known ransomware gangs that have targeted US government       entities include LockBit, BlackCat/ALPHV, Cl0p, Royal, and Vice Society.               According to a Reuters report, the Cybersecurity and Infrastructure Security       Agency also issued a statement, claiming it was "actively tracking this       network security incident and together with our partners, we are        collaborating with the State of Nevada to offer our assistance."              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/nevada-state-offices-close-after-wide-r       anging-network-security-incident              $$       --- SBBSecho 3.28-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700       SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470       SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca