Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 2,283 of 2,445    |
|    Mike Powell to All    |
|    MS SharePoint exploited t    |
|    24 Jan 26 10:20:51    |
      TZUTC: -0500       MSGID: 2041.consprcy@1:2320/105 2dda214c       PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       FORMAT: flowed       Microsoft SharePoint exploited to hack multiple energy firms              Date:       Fri, 23 Jan 2026 18:10:00 +0000              Description:       Hackers are abusing SharePoint to break into people's emails and propagate       further throughout the networks.              FULL STORY              Hackers are, once again, using SharePoint to target large energy firms, steal       employee email credentials, and propagate the attack further.               This is according to a new report from Microsoft, which claims multiple large       organizations in the energy sector were already targeted.               The attack starts from a previously compromised email account . The crooks        use it for initial contact, sending a legitimate-looking email with a       SharePoint link. When clicked, the link redirects the victims to a       credential-harvesting website, where they are prompted to log in.              What to do to stay safe              Victims that try to log in actually share their credentials with the       attackers, who gain access to real corporate email accounts, and access them       from a different IP address. After that, they take a few steps to establish       persistence while hiding from the victims.               Those steps include creating an inbox rule to delete incoming messages, and       marking emails as read.               In the final step, the attackers send large volumes of new phishing emails to       both internal and external contacts, as well as distribution lists. The       inboxes are monitored, delivery failure and OOO emails are deleted and, in       order to maintain the appearance of legitimacy, responses are read and       questions are answered.               Microsoft did not share the details about the campaign and its success. We       dont know the exact number of organizations targeted, or how many people had       their inboxes compromised as a result.               The company did stress that for those that are compromised, simply resetting       the password will not suffice, since the crooks created rules and changed       settings that enable persistence even when they are ousted.               "Even if the compromised user's password is reset and sessions are revoked,       the attacker can set up persistence methods to sign-in in a controlled manner       by tampering with MFA ," Microsoft warns.               "For instance, the attacker can add a new MFA policy to sign in with a       one-time password (OTP) sent to the attacker's registered mobile number. With       these persistence mechanisms in place, the attacker can have control over the       victim's account despite conventional remediation measures."               Besides MFA, Microsoft also suggested conditional access policies that can       trigger alarms if certain conditions are met.                Via The Register               ======================================================================       Link to news story:       https://www.techradar.com/pro/security/microsoft-sharepoint-exploited-to-hack-       multiple-energy-firms              $$       --- SBBSecho 3.28-Linux        * Origin: Capitol City Online (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700       SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470       SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca