home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,076 of 2,445   
   Mike Powell to All   
   CyberVolk returns with ra   
   13 Dec 25 09:45:46   
   
   TZUTC: -0500   
   MSGID: 1833.consprcy@1:2320/105 2da2b943   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Notorious Russian cybercriminals return with new ransomware   
      
   Date:   
   Fri, 12 Dec 2025 14:15:00 +0000   
      
   Description:   
   But encrypted files can easily be decrypted because someone forgot about a   
   hardcoded artifact.   
      
   FULL STORY   
      
   CyberVolk, a Russian hacktivist group thats been dormant for most of 2025 is   
   back, offering an updated version of its RaaS model to its affiliates.   
   However, there seems to be a gaping structural hole in the encryptor that   
   renders the entire model harmless.    
      
   CyberVolk is a relatively young, pro-Russian hacktivist collective that   
   emerged in 2024.The groups entire infrastructure is on Telegram, making it a   
   simple process for affiliates to lock files and demand ransom, even if they   
   aren't too tech-savvy.    
      
   When the platform targeted the group back in 2024, and shut down a few of its   
   channels, the group disappeared. Now, it is back, but it seems to be    
   operating on the same principle - everything is managed through Telegram, and   
   prospective customers and operational queries are directed to the main bot.    
      
   Most hacktivists are engaged in Distributed Denial of Service (DDoS) attacks,   
   cyber-espionage, and data theft.    
      
   CyberVolk, however, added ransomware into the mix, making it unclear if    
   theyre actually hacktivists, or just financially-motivated cybercriminals   
   hiding behind a pro-Russia stance. This was confirmed by cybersecurity   
   researchers Sentinel One, whose latest report digs deeper into the group and   
   its modus operandi.    
      
   The encryptor, VolkLocker, includes built-in Telegram automation for command   
   and control, while the C2 is customizable. Some CyberVolk operators have   
   published examples that include additional capabilities, such as keylogging   
   control, the researchers explained.    
      
   It also has functions that alert operators when a new infection happens,   
   similar to Telegram-enabled infostealers. When a host is infected, basic   
   system information and a screenshot are sent to the configured Telegram chat.    
      
   But, the encryption key for the tool is not generated dynamically. It is   
   hardcoded as a hex string within the binaries, allowing victims to recover    
   all encrypted data without paying any extraction fees. SentinelOne believes   
   the key was likely left in there by mistake, similarly to how legitimate   
   software developers sometimes forget passwords in their products - so its an   
   underwhelming comeback for the group.    
      
    Via The Register    
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/notorious-russian-cybercriminals-return   
   -with-new-ransomware   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: Capitol City Online (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca