Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,785 of 2,445    |
|    Mike Powell to All    |
|    Brickstorm was stealing d    |
|    26 Sep 25 10:07:05    |
      TZUTC: -0500       MSGID: 1534.consprcy@1:2320/105 2d3be817       PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       FORMAT: flowed       Under the radar - Google warns new Brickstorm malware was stealing data from       US firms for over a year              Date:       Thu, 25 Sep 2025 17:05:00 +0000              Description:       Chinese state-sponsored actors are at it again targeting legal, SaaS, and       government agencies.              FULL STORY              US organizations across the legal, technology, SaaS, and business process       outsourcing sectors were targeted by a new malware variant named Brickstorm       for over a year, leading to major data loss, experts have warned.               Googles Threat Intelligence Group (GTIG) found the threat actors behind the       campaign are UNC5221, a suspected China-nexus threat known for stealthy       operations and long-term persistence.               This group first targeted zero-day vulnerabilities in Linux devices and       BSD-based appliances, since these are often overlooked in asset inventories       and excluded from central logging. As such, they make for an ideal foothold       for the attackers.              Cyber-espionage               Once inside, UNC5221 used Brickstorm to move laterally, harvest credentials,       and exfiltrate data with minimal telemetry. In some cases, the malware       remained undetected for more than a year, since the average dwell time was       said to be a mighty 393 days.               In many cases, they would pivot from fringe devices to VMware vCenter and        ESXi hosts, using stolen credentials to deploy Brickstorm and escalate       privileges.               To maintain persistence, they modified startup scripts and deployed webshells       that allowed for remote command execution. They cloned sensitive virtual       machines without even powering them on, and thus avoiding triggering security       tools.               The campaigns objectives appear to span geopolitical espionage, intellectual       property theft, and access operations.               Since legal companies were targeted as well, the researchers suspected        UNC5221 was interested in US national security, and trade topics, while       targeting SaaS providers could have been used to pivot into downstream       customer environments.               To counter Brickstorm, Mandiant recommends a threat-hunting approach based on       tactics, techniques, and procedures (TTPs) rather than atomic indicators,       which have proven unreliable due to the actors operational discipline.               The researchers urged businesses to update asset inventories, monitor       appliance traffic, and enforce multi-factor authentication .              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/under-the-radar-google-warns-new-bricks       torm-malware-was-stealing-data-from-us-firms-for-over-a-year              $$       --- SBBSecho 3.28-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700       SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470       SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca