home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,745 of 2,445   
   Mike Powell to All   
   US Senator says Microsoft   
   12 Sep 25 13:33:39   
   
   TZUTC: -0500   
   MSGID: 1494.consprcy@1:2320/105 2d29a359   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   US Senator says Microsoft should be probed for 'gross cybersecurity   
   negligence' after hospital ransomware attacks   
      
   Date:   
   Fri, 12 Sep 2025 15:00:00 +0000   
      
   Description:   
   Senator Wyden calls for Microsoft to be held responsible.   
      
   FULL STORY   
      
   US Senator Ron Wyden has written a letter to the FTC Chairman to urge them to   
   open an investigation into Microsoft over the companys negligent    
   cybersecurity in relation to ransomware attacks against US critical   
   infrastructure;    
      
   "I urge the FTC to investigate Microsoft and hold the company responsible for   
   the serious harm it has caused by delivering dangerous, insecure software to   
   the U.S. government and to critical infrastructure entities, such as those in   
   the U.S. health care sector," Wyden wrote in a letter to FTC Chairman Andrew   
   Ferguson.    
      
   Earlier this year, millions were left at risk after Ascension Healthcare   
   revealed a  data breach, most likely at the hands of C10p ransomware.   
   Karberoasting attacks    
      
   Senator Wydens office has reportedly obtained new information - "the hack   
   began when a contractor clicked on a malicious link after conducting a web   
   search on Microsofts Bing search engine."    
      
   Following this, a contractors laptop was infected with malware, which the   
   letter claims was due to "dangerously insecure default settings on Microsoft   
   software allowed the hackers to ultimately gain highly privileged access to   
   the most sensitive parts of Ascensions network."    
      
   Without timely action, Microsofts culture of negligent cybersecurity,    
   combined with its de facto monopolization of the enterprise operating system   
   market, poses a serious national security threat and makes additional hacks   
   inevitable.    
      
   The attacks reportedly used something called Kerberoasting - a technique    
   which exploits insecure encryption technologies from all the way back in the   
   1980s known as RC4. These are still supported by Microsoft software, and    
   Wyden argues Microsoft should warn customers about such dangers.    
      
   Microsoft has, as yet, not released a patch or update for the vulnerability,   
   nor has the firm reached out to warn customers.    
      
   RC4 is an old standard, and we discourage its use both in how we engineer our   
   software and in our documentation to customers  which is why it makes up less   
   than .1% of our traffic," a Microsoft spokesperson told TechRadar Pro .    
      
   "However, disabling its use completely would break many customer systems. For   
   this reason, were on a path to gradually reduce the extent to which customers   
   can use it, while providing strong warnings against it and advice for using    
   it in the safest ways possible. We have it on our roadmap to ultimately   
   disable its use. Weve engaged with The Senators office on this issue and will   
   continue to listen and answer questions from them or others in government.    
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/us-senator-says-microsoft-should-be-pro   
   bed-for-gross-cybersecurity-negligence-after-hospital-ransomware-attacks   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca