home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,891 of 2,445   
   Mike Powell to All   
   US Government Telco provi   
   31 Oct 25 10:09:59   
   
   TZUTC: -0500   
   MSGID: 1647.consprcy@1:2320/105 2d6a0db6   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Telco provider used by US government and others hit by nation-state hackers   
      
   Date:   
   Thu, 30 Oct 2025 15:02:00 +0000   
      
   Description:   
   Ribbon Communications confirms breach, but says it only affected three   
   "smaller" clients.   
      
   FULL STORY   
      
   Ribbon Communications has confirmed it suffered a cyberattack in which it    
   lost sensitive customer documents.    
      
   In a new 10-Q form filed with the US Securities and Exchange Commission    
   (SEC), the company said it became aware of the attack in early September    
   2025. Subsequent investigation determined that the attack was most likely   
   conducted by a nation-state actor, with the goal of stealing corporate files.    
      
   Ribbon is a major supplier of telco services and software, with customers   
   including Verizon, CenturyLink, and the US Defense Department, but also   
   smaller customers - three of which were impacted by this intrusion.   
      
   "Smaller customers" affected   
      
   The company did not want to name the victims since the investigation is   
   currently ongoing, but added that a total of four older files were accessed.    
      
   The company has preliminarily determined that initial access by the threat   
   actor may have occurred as early as December 2024, with final determinations   
   dependent on completion of the ongoing investigation, the filing reads.    
      
   As of the date of this quarterly report on Form 10-Q, we are not aware of   
   evidence indicating that the threat actor accessed or exfiltrated any    
   material information. Several customer files saved outside of the main    
   network on two laptops do appear to have been accessed by the threat actor    
   and those customers have been notified by the company.    
      
   Ribbon did not discuss the identity of the attackers, or the nation-state   
   behind it. It stressed that the attack most likely wont have a material    
   impact despite additional costs related to the investigation and the network   
   strengthening efforts.    
      
   In the filing, Ribbon also said it has brought in multiple third-party   
   cybersecurity experts to assist with the investigation and the forensics, and   
   notified relevant law enforcement agencies, as well.    
      
   "While the investigation is ongoing, the Company believes that it has been   
   successful in terminating the unauthorized access by the threat actor," it   
   concluded.    
      
    Via The Register    
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/telco-provider-used-by-us-government-an   
   d-others-hit-by-nation-state-hackers   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca