Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,735 of 2,445    |
|    Mike Powell to All    |
|    Hackers abuse TOR network    |
|    11 Sep 25 09:04:40    |
      TZUTC: -0500       MSGID: 1484.consprcy@1:2320/105 2d2812c4       PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       FORMAT: flowed       Hackers abuse TOR network and misconfigured Docker APIs to steal crypto - so       keep an eye on your wallet              Date:       Wed, 10 Sep 2025 14:00:00 +0000              Description:       A major cryptojacking campaign, possibly turning into a botnet, was seen in       the wild.              FULL STORY              Cybercriminals are targeting exposed Docker APIs to install cryptojackers,       scan the internet for more potential victims, and possibly even build out a       botnet.               Recently, security researchers from Akamai wrote an in-depth report about a       new campaign, seemingly a continuation of a similar one that was spotted by       Trend Micro in late June 2025.               The campaign revolves around looking for servers with Dockers API exposed on       port 2375. Once identified, the crooks create a new container and pull down a       script from a hidden TOR browser (.onion) website.              Cryptojacking botnet               The script tweaks systems settings to establish persistence, installs        scanning software like Masscan, and drops additional malware . This malware       then scans the internet for other exposed instances, repeating the infection       process.               The malware also has code that could attack Telnet (port 23) and Chromiums       debugging port (9222). For the former, it would brute-force weak routers and       other devices, while for the latter it could hijack browser sessions and        steal cookies and other data.               These parts arent active yet, but the code suggests they may be enabled        later, the researchers said.               Right now, the campaign is mostly about cryptojacking - the instances are       hijacked to mine the Monero cryptocurrency. But the extra code hints that       attackers want to expand it into a botnet, which could steal data or launch       large-scale DDoS attacks .               To prevent and mitigate these attacks, Akamai suggests four things every IT       team can do. First, they should isolate the Docker environment from other       parts of the network, since this limits the ability of the attackers to move       laterally. They should also make sure they expose as few services as possible       to the internet.               This malware exploits the ports 2375, 9222, and 23 by accessing these from        the internet, and blocking such access can totally mitigate the threat, they       said. Furthermore, when using the Chrome debugger port (9222), IT teams        should use specific remote IP addresses instead of 0.0.0.0. and finally, when       installing a new device, they should make sure to change the default       credentials to something stronger.                Via The Hacker News              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/hackers-abuse-tor-network-and-misconfig       ured-docker-apis-to-steal-crypto-so-keep-an-eye-on-your-wallet              $$       --- SBBSecho 3.28-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700       SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470       SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca