Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,904 of 2,445    |
|    Mike Powell to All    |
|    Thousands fall victim to    |
|    03 Nov 25 09:22:27    |
      TZUTC: -0500       MSGID: 1661.consprcy@1:2320/105 2d6df720       PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       FORMAT: flowed       Thousands fall victim to ransomware as European attacks reach record highs -       here's why they're so at risk              Date:       Mon, 03 Nov 2025 11:05:24 +0000              Description:       European ransomware victims make up nearly 22% of global targets, report       claims.              FULL STORY              European companies are increasingly the targets of ransomware and extortion,       new research from CrowdStrike has claimed, with the region now accounting for       almost 22% of global ransomware victims, second only behind North America.               Since 2024, over 2,100 victims have been posted on extortion leak sites        across the continent - making European firms twice as likely to be targeted       than those in the Asia Pacific, and the view that richer companies can pay       higher ransoms makes them attractive targets.               The strict GDPR regulations and heavy penalties that come with violations        have created the perception that European companies are more likely to pay       ransom demands, with lucrative industries like manufacturing, professional       service, and technology most commonly targeted.               Evolving threats              No matter where in the world you are, the ransom attack tactics and        techniques usually stay pretty similar. Credentials are dumped from backups,       files are remotely encrypted, access is leveraged to unmanaged systems in       order to steal data and deploy the ransomware, and Linux ransomware on VMware       EsXI infrastructure is deployed.               Although it's a common playbook, its quicker than ever for criminals to       execute this, with adversaries averaging just 35.5 hours between initial       access and ransomware deployment - meaning security teams are scrambling to       protect themselves after they detect an incident, even if they know what's       coming.               Geopolitics plays an important role in European attacks, with the war in       Ukraine driving politically motivated hacktivist groups to target supporters       on each side, collecting information and disabling services.               The cyber battlefield in Europe is more crowded and complex than ever, said       Adam Meyers, head of Counter Adversary Operations at CrowdStrike.               Were seeing a dangerous convergence of criminal innovation and geopolitical       ambition, with ransomware crews using enterprise-grade tools and state-backed       actors exploiting global crises to disrupt, persist, and conduct espionage.        In this high-stakes environment, intelligence-led defense powered by AI and       guided by human expertise is the only combination designed to stop cyber       threats.              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/thousands-fall-victim-to-ransomware-as-       european-attacks-reach-record-highs-heres-why-theyre-so-at-risk              $$       --- SBBSecho 3.28-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700       SEEN-BY: 226/30 227/114 229/110 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca