home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,857 of 2,445   
   Mike Powell to All   
   Russian tech firm attacke   
   19 Oct 25 09:15:12   
   
   TZUTC: -0500   
   MSGID: 1614.consprcy@1:2320/105 2d5a2ebe   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Russian tech firm attacked by Chinese state hackers in allied attack   
      
   Date:   
   Fri, 17 Oct 2025 17:43:00 +0000   
      
   Description:   
   The Chinese were apparently spying on Russians for almost half a year.   
      
   FULL STORY   
      
   Chinese hackers were recently seen targeting Russians, which raised eyebrows   
   among the western cybersecurity community who perceive the two countries as   
   allies in cyberspace and beyond.    
      
   Earlier this week, security outfit Symantec published a new report in which    
   it detailed the work of Jewelbug, a Chinese state-sponsored threat actor    
   thats been highly active in recent months. In the report, Symantec said   
   Jewelbug was seen going after targets in South America, South Asia, Taiwan   
   and, most notably, Russia.    
      
   In early 2025, Jewelbug managed to sneak into the network of a Russian IT   
   service provider, and remain there for no less than five months. During that   
   time, they accessed code repositories and software build systems that they   
   could leverage to run supply chain attacks against the IT service providers   
   customers.   
      
   7zup.exe and Yandex    
      
   The compromise was spotted when researchers found a file named 7zup.exe on    
   the IT providers system. This is a renamed copy of a legitimate, Microsoft   
   binary, called CDB (Microsoft Console Debugger).    
      
   This tool can be used to run shellcode, bypass application whitelisting,   
   launch executables, run DLLs, and terminate security solutions, Symantec   
   added.    
      
   Use of a renamed version of cbd.exe is a hallmark of Jewelbug activity, the   
   report reads. Microsoft recommends that CDB should be blocked from running by   
   default and whitelisted for specific users only when its explicitly needed.    
      
   With the help of CBD, Jewelbug managed to dump credentials, establish   
   persistence, and elevate privileges via scheduled tasks. They tried to cover   
   their tracks by clearing Windows Event Logs, and used Yandex Cloud to   
   exfiltrate data. Yandex is a Russian cloud service provider , which was   
   probably chosen since its commonly used in the country and doesnt usually   
   raise any red flags.    
      
   The targeting of a Russian organization by a Chinese APT group shows,    
   however, that Russia is not out-of-bounds when it comes to operations by   
   China-based actors, Symantec concluded.    
      
    Via The Register    
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/russian-tech-firm-attacked-by-chinese-s   
   tate-hackers-in-allied-attack   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca