home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,032 of 2,445   
   Mike Powell to All   
   Chinese hackers used Bric   
   05 Dec 25 10:41:56   
   
   TZUTC: -0500   
   MSGID: 1789.consprcy@1:2320/105 2d983a41   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Chinese hackers used Brickworm malware to breach critical US infrastructure   
      
   Date:   
   Fri, 05 Dec 2025 13:30:00 +0000   
      
   Description:   
   CISA and friends are sounding the alarm, once again, for Chinese   
   state-sponsored hackers   
      
   FULL STORY   
      
   Chinese state-sponsored threat actors have been using Brickworm malware   
   against government organizations around the world - maintaining access,   
   exfiltrating files, and eavesdropping.    
      
   This is according to a joint report published by the US Cybersecurity and   
   Infrastructure Security Agency (CISA), the National Security Agency (NSA),    
   and the Canadian Centre for Cyber Security. The report outlines how the   
   malware operates based on the analysis of eight samples obtained from victim   
   networks.    
      
   In this, it was said that PRC hackers are targeting government and    
   information technology organizations, without detailing who the victims are,   
   or where theyre located. At the same time, Crowdstrike said it observed this   
   being used against an Asia-Pacific government organization.    
      
   Manipulating files   
      
   To break into target networks, the threat actors would go for VMware vSphere   
   and Windows systems.    
      
   At the victim organization where CISA conducted an incident response   
   engagement, PRC state-sponsored cyber actors gained long-term persistent   
   access to the organizations internal network in April 2024 and uploaded   
   BRICKSTORM malware to an internal VMware vCenter server, CISA stressed. It   
   then added that the crooks went for Active Directory:    
      
   They also gained access to two domain controllers and an Active Directory   
   Federation Services (ADFS) server. They successfully compromised the ADFS   
   server and exported cryptographic keys.    
      
   Besides being able to maintain stealthy access, Brickwork also allowed them    
   to access and manipulate all of the files on the devices. In some cases, they   
   were able to move laterally throughout the network, compromising even more   
   devices.    
      
   For CISA Acting Director Madhu Gottumukkala, the report underscores the grave   
   threats posed by the Peoples Republic of China that create ongoing   
   cybersecurity exposures and costs to the United States, our allies and the   
   critical infrastructure we all depend on.    
      
   These state-sponsored actors are not just infiltrating networks - they are   
   embedding themselves to enable long-term access, disruption, and potential   
   sabotage, he said.    
      
   China has been attributed with countless high-profile cyberattacks against   
   countries in the west, throughout the years. They were accused of going for   
   telecommunications providers, critical infrastructure, and government    
   entities - interested in cyber-espionage and potential disruption. In some   
   cases, the attacks were planned and conducted years ago, and were part of   
   possible future war efforts against Taiwan.    
      
   The countrys representatives, however, always vehemently denied all   
   accusations, instead describing the US as the biggest cyber-bully in the   
   world.    
      
    Via The Record    
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/chinese-hackers-used-brickworm-malware-   
   to-breach-critical-us-infrastructure   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca