home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,904 of 2,445   
   Mike Powell to All   
   Thousands fall victim to   
   03 Nov 25 09:22:27   
   
   TZUTC: -0500   
   MSGID: 1661.consprcy@1:2320/105 2d6df720   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Thousands fall victim to ransomware as European attacks reach record highs -   
   here's why they're so at risk   
      
   Date:   
   Mon, 03 Nov 2025 11:05:24 +0000   
      
   Description:   
   European ransomware victims make up nearly 22% of global targets, report   
   claims.   
      
   FULL STORY   
      
   European companies are increasingly the targets of ransomware and extortion,   
   new research from CrowdStrike has claimed, with the region now accounting for   
   almost 22% of global ransomware victims, second only behind North America.    
      
   Since 2024, over 2,100 victims have been posted on extortion leak sites    
   across the continent - making European firms twice as likely to be targeted   
   than those in the Asia Pacific, and the view that richer companies can pay   
   higher ransoms makes them attractive targets.    
      
   The strict GDPR regulations and heavy penalties that come with violations    
   have created the perception that European companies are more likely to pay   
   ransom demands, with lucrative industries like manufacturing, professional   
   service, and technology most commonly targeted.    
      
   Evolving threats   
      
   No matter where in the world you are, the ransom attack tactics and    
   techniques usually stay pretty similar. Credentials are dumped from backups,   
   files are remotely encrypted, access is leveraged to unmanaged systems in   
   order to steal data and deploy the ransomware, and Linux ransomware on VMware   
   EsXI infrastructure is deployed.    
      
   Although it's a common playbook, its quicker than ever for criminals to   
   execute this, with adversaries averaging just 35.5 hours between initial   
   access and ransomware deployment - meaning security teams are scrambling to   
   protect themselves after they detect an incident, even if they know what's   
   coming.    
      
   Geopolitics plays an important role in European attacks, with the war in   
   Ukraine driving politically motivated hacktivist groups to target supporters   
   on each side, collecting information and disabling services.    
      
   The cyber battlefield in Europe is more crowded and complex than ever, said   
   Adam Meyers, head of Counter Adversary Operations at CrowdStrike.    
      
   Were seeing a dangerous convergence of criminal innovation and geopolitical   
   ambition, with ransomware crews using enterprise-grade tools and state-backed   
   actors exploiting global crises to disrupt, persist, and conduct espionage.    
   In this high-stakes environment, intelligence-led defense powered by AI and   
   guided by human expertise is the only combination designed to stop cyber   
   threats.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/thousands-fall-victim-to-ransomware-as-   
   european-attacks-reach-record-highs-heres-why-theyre-so-at-risk   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca