home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,754 of 2,445   
   Mike Powell to All   
   Chinese malware is floodi   
   16 Sep 25 10:35:13   
   
   TZUTC: -0500   
   MSGID: 1503.consprcy@1:2320/105 2d2ebf90   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Chinese malware is flooding GitHub pages - HiddenGh0st, Winos and kkRAT hit   
   devs via SEO poisoning   
      
   Date:   
   Mon, 15 Sep 2025 21:00:00 +0000   
      
   Description:   
   Users searching for different programs are at risk from at least five   
   different RATs.   
      
   FULL STORY   
      
   Chinese users looking to download popular browsers and communications    
   software are being targeted by different malware variants , granting    
   attackers remote access capabilities. This is according to multiple   
   cybersecurity organizations, including Fortinet FortiGuard Labs, and Zscaler   
   ThreatLabz.    
      
   The former discovered an SEO poisoning campaign to deliver two Remote Access   
   Trojans (RAT) - HiddenGh0st, and Winos - both variants of the infamous Gh0st   
   RAT.    
      
   In the campaign, the threat actors created spoofed download pages for    
   programs such as DeepL Translate, Google Chrome, Signal, Telegram, WhatsApp,   
   and WPS Office, on typosquatted domains.   
      
   Stealing crypto and disabling AV    
      
   They then manipulated search rankings using different SEO plugins to trick   
   people searching for these programs into visiting the wrong sites. The   
   download seemingly deploys the wanted program, but the installer is   
   trojanized, also serving one of the above-mentioned trojans.    
      
   At the same time, researchers from Zscaler observed a previously unknown   
   trojan, called kkRAT, being disseminated. This campaign started in May this   
   year and also includes Winos and FatalRAT.    
      
   kkRATs code is similar to that of Gh0st RAT and Big Bad Wolf, Zscaler   
   explained: kkRAT employs a network communication protocol similar to Ghost   
   RAT, with an added encryption layer after data compression. The RAT's    
   features include clipboard manipulation to replace cryptocurrency addresses   
   and the deployment of remote monitoring tools (i.e. Sunlogin, GotoHTTP)."    
      
   It is also capable of killing antivirus software before running any malicious   
   activity, to better hide its presence. Among the AV solutions targeted by the   
   trojan are 360 Internet Security suite, 360 Total Security, HeroBravo System   
   Diagnostics suite, and others.    
      
   Unlike Fortinets discovery, in this campaign the phishing sites are hosted on   
   GitHub pages, leaning into the trust that the platform enjoys with its   
   community to distribute the trojans. The GitHub account used in this campaign   
   has since been terminated.    
      
    Via The Hacker News   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/chinese-malware-is-flooding-github-page   
   s-hiddengh0st-winos-and-kkrat-hit-devs-via-seo-poisoning   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca