home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,044 of 2,445   
   Mike Powell to All   
   Threats to watch this yea   
   08 Dec 25 10:18:01   
   
   TZUTC: -0500   
   MSGID: 1801.consprcy@1:2320/105 2d9c2932   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Threats to watch this year: from data theft and extortion to EDR killers   
      
   Date:   
   Sun, 07 Dec 2025 15:00:00 +0000   
      
   Description:   
   Threat actors have shifted behaviors, refined their tooling and adapted   
   tactics; here's what you need to know.   
      
   FULL STORY   
      
   As cybersecurity threats continue to grow in scale, sophistication and    
   intent, its vital for organizations to understand the top actors, emerging   
   risks and evolving techniques shaping the landscape to help strengthen cyber   
   defenses.    
      
   A recent report by Bridewell highlights just how dynamic the adversarial   
   environment has become over the past year.    
      
   Threat actors have shifted behaviors, refined their tooling and adapted their   
   tactics.    
      
   Here are some key takeaways organizations need to know to contend with   
   imminent threats.   
      
   The Rise of Data Theft and Extortion    
      
   Historically, ransomware tactics were primarily centered around encrypting   
   victim data and demanding payment for decryption keys. However, recent    
   attacks highlight a shift in tactics, with threat actors now prioritizing    
   data theft and extortion by threatening to publish stolen information unless   
   ransoms are paid.    
      
   This was witnessed in an attack on UK telecom provider Colt Technology   
   Services, where the Warlock ransomware group exploited a vulnerability in   
   Microsoft SharePoint to infiltrate the companys systems.    
      
   The attackers stole several hundred gigabytes of sensitive data, including   
   employee salary information, financial records, customer contracts and    
   network architecture details. As a result of not paying the ransom, the group   
   subsequently posted a file list on a Russian Tor forum, offering over a   
   million documents for sale.    
      
   Similarly, the Clop ransomware group demonstrated this shift in May 2023 by   
   exploiting a zero-day vulnerability in the MOVEit filetransfer software   
   (CVE202334362) to exfiltrate large volumes of data from hundreds of   
   organizations, including high-profile companies such as the BBC and Boots.   
   Rather than just encrypting systems, Clop threatened to publicly publish the   
   stolen information via its leak site.    
      
   This evolution exploits the growing regulatory and reputational pressures   
   organizations face, particularly in jurisdictions with strict privacy laws.   
   While encryption -based attacks often result in larger individual ransom   
   demands due to the urgency of restoring critical services. Also, improvements   
   in data recovery and backup controls have inadvertently made data theft and   
   extortion a more effective alternative for attackers.    
      
   The recent major data theft operations performed by hacker groups such as   
   Scattered Spider and Shiny Hunters, who are related to a collective known as   
   the Com or the Community have targeted large software service providers such   
   as Salesforce and other companies that integrate with their platform. This    
   has highlighted again the appetite to use data theft and extortion over   
   deploying ransomware to encrypt the victims files.   
      
   Exploitation of Vulnerabilities and Edge Devices   
      
   Unpatched vulnerabilities in internet-facing systems and edge devices remain    
   a primary attack vector for ransomware groups. Attackers are exploiting flaws   
   in widely deployed technologies including VPNs , remote monitoring tools, and   
   network appliances, to gain initial access into company systems. These   
   vulnerabilities allow mass compromise at scale and are a major contributor to   
   successful ransomware campaigns.    
      
   In 2024 infamous ransomware groups, Clop and Termite, emerged as highly   
   proficient actors in carrying out attacks against managed file transfer   
   services. Additionally, earlier this year, Clop targeted Cleo, the enterprise   
   integration and managed file transfer software provider, by exploiting a   
   zero-day vulnerability (CVE-2024-50623) in its integration software.    
      
   This attack affected over 80 organizations, primarily in the   
   telecommunications and healthcare sectors, resulting in significant data   
   exposure and operational disruption. More recently, we have seen several   
   threat actors conducting widespread attacks targeting unpatched Fortinet,   
   Cisco and Ivanti devices. This includes access brokers and affiliates   
   associated with Qilin, Akira and Ransomhub ransomware groups.   
      
   VMware Targeting, EDR Killers and Offensive Tooling   
      
   Ransomware actors continue to target hypervisors such as VMware ESXi   
   environments, with the intention of disrupting critical IT infrastructure   
   quickly. Groups such as VanHelsing and DragonForce have been linked to recent   
   attacks, actively employing this tactic in ongoing campaigns.    
      
   Meanwhile, the adversaries are shifting their efforts towards developing   
   capabilities to evade Endpoint Detection and Response (EDR) systems, known as   
   EDR killers, which is often achieved by the abuse of vulnerable drivers or   
   native software features.    
      
   The success of these attacks has been amplified by the increased use of   
   Living-Off-the-Land Binaries (LOLBINs) and Remote Monitoring and Management   
   (RMM) tools, another method used to evade EDR tools by enabling threat actors   
   to blend in with normal system or environment operations to remain unnoticed,   
   making detection and mitigation significantly more difficult for   
   organizations.    
      
   Offensive security tools remain central to ransomware operations. Despite   
   combined efforts by Microsofts Digital Crimes Unit (DCU), Fortra, and the   
   Health Information Sharing and Analysis Center (Health-ISAC) in recent years   
   to combat the use of authorized, legacy copies of Cobalt Strike, it remains   
   the most widely used offensive security tool among ransomware operators.    
      
   While Fortra has reported an 80% reduction in unauthorized copies observed in   
   the wild over the past two years, in reality the situation remains a   
   cat-and-mouse game as malicious C2 infrastructure is removed from more   
   reputable hosting providers, operators simply relocate it to less reputable   
   ones.    
      
   Even so, this shift still presents some tactical advantages for defenders, as   
   infrastructure hosted on lower-tier providers is more likely to be blocked by   
   security products such as next-generation firewalls and web proxies.    
      
   Meanwhile, other offensive tools such as Metasploit, Sliver, Brute Ratel and   
   more recently variants such as Pyramid C2, a Python -based command and    
   control (C2) framework and Adaptix C2 are steadily gaining popularity.   
      
   Final thoughts   
      
   As we move into 2026, its clear that cybercriminals are becoming more agile,   
   more opportunistic and more determined to exploit both technical weaknesses   
   and organizational blind spots. With datatheftfirst extortion models on the   
   rise, increased targeting of edge devices, and the continued refinement of   
   EDRevading tools, defenders face a rapidly evolving challenge that demands   
   equal adaptability.    
      
   Organizations must prioritize proactive patching, strengthen monitoring    
   across hybrid environments and invest in threat intelligence that keeps pace   
   with adversaries shifting tactics. Those that build resilience now, through   
   preparedness, visibility and robust incident response, will be best    
   positioned to withstand the threats that lie ahead.    
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/threats-to-watch-this-year-from-data-theft-and-e   
   xtortion-to-edr-killers   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca