home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,735 of 2,445   
   Mike Powell to All   
   Hackers abuse TOR network   
   11 Sep 25 09:04:40   
   
   TZUTC: -0500   
   MSGID: 1484.consprcy@1:2320/105 2d2812c4   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Hackers abuse TOR network and misconfigured Docker APIs to steal crypto - so   
   keep an eye on your wallet   
      
   Date:   
   Wed, 10 Sep 2025 14:00:00 +0000   
      
   Description:   
   A major cryptojacking campaign, possibly turning into a botnet, was seen in   
   the wild.   
      
   FULL STORY   
      
   Cybercriminals are targeting exposed Docker APIs to install cryptojackers,   
   scan the internet for more potential victims, and possibly even build out a   
   botnet.    
      
   Recently, security researchers from Akamai wrote an in-depth report about a   
   new campaign, seemingly a continuation of a similar one that was spotted by   
   Trend Micro in late June 2025.    
      
   The campaign revolves around looking for servers with Dockers API exposed on   
   port 2375. Once identified, the crooks create a new container and pull down a   
   script from a hidden TOR browser (.onion) website.   
      
   Cryptojacking botnet    
      
   The script tweaks systems settings to establish persistence, installs    
   scanning software like Masscan, and drops additional malware . This malware   
   then scans the internet for other exposed instances, repeating the infection   
   process.    
      
   The malware also has code that could attack Telnet (port 23) and Chromiums   
   debugging port (9222). For the former, it would brute-force weak routers and   
   other devices, while for the latter it could hijack browser sessions and    
   steal cookies and other data.    
      
   These parts arent active yet, but the code suggests they may be enabled    
   later, the researchers said.    
      
   Right now, the campaign is mostly about cryptojacking - the instances are   
   hijacked to mine the Monero cryptocurrency. But the extra code hints that   
   attackers want to expand it into a botnet, which could steal data or launch   
   large-scale DDoS attacks .    
      
   To prevent and mitigate these attacks, Akamai suggests four things every IT   
   team can do. First, they should isolate the Docker environment from other   
   parts of the network, since this limits the ability of the attackers to move   
   laterally. They should also make sure they expose as few services as possible   
   to the internet.    
      
   This malware exploits the ports 2375, 9222, and 23 by accessing these from    
   the internet, and blocking such access can totally mitigate the threat, they   
   said. Furthermore, when using the Chrome debugger port (9222), IT teams    
   should use specific remote IP addresses instead of 0.0.0.0. and finally, when   
   installing a new device, they should make sure to change the default   
   credentials to something stronger.    
      
    Via The Hacker News   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/hackers-abuse-tor-network-and-misconfig   
   ured-docker-apis-to-steal-crypto-so-keep-an-eye-on-your-wallet   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca