home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,301 of 2,445   
   Mike Powell to All   
   More AI malware has been   
   27 Jan 26 09:59:04   
   
   TZUTC: -0500   
   MSGID: 2059.consprcy@1:2320/105 2dde10c3   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   More AI malware has been found - and this time, crypto developers are under   
   attack   
      
   Date:   
   Mon, 26 Jan 2026 16:45:00 +0000   
      
   Description:   
   KONNI is using AI-generated backdoors to target crypto bros - and security   
   pros should pay attention.   
      
   FULL STORY   
      
   Security researchers have found more malware being developed with the help of   
   Gen AI, as the use of AI tools in cybercrime moves from theory into practice,   
   and that defenders should also start integrating AI into their tech stack.    
      
   Security outfit Check Point Research (CPR) has detailed KONNI , a known North   
   Korean state-sponsored threat actor that has been around for more than a   
   decade.    
      
   According to CPR, KONNI is known for targeting South Korean politicians,   
   diplomats, academics, and other similar targets. However, after more than a   
   decade of chasing after political and diplomatic targets, KONNI shifted its   
   attention towards software developers - specifically, blockchain and crypto   
   developers.   
      
   AI-generated PowerShell backdoor    
      
   CPR says that in the latest campaign, KONNI was mailing IT technicians with   
   highly convincing phishing lures, attempting to access cloud infrastructure,   
   source code repositories, APIs, and blockchain-related credentials.    
      
   Those that took the bait deployed an AI-generated PowerShell backdoor that   
   granted the attackers access to their computers, and through it, to all of    
   the secrets stored there.    
      
   A defining aspect of this campaign is the deployment of an AI-generated   
   PowerShell backdoor, demonstrating how artificial intelligence is    
   accelerating malware development and deployment, CPR said in its report.    
      
   Rather than introducing entirely new attack techniques, AI enables faster   
   iteration, easier customization, and greater flexibility.    
      
   The report also stresses that this means cybersecurity professionals will    
   have to change, or evolve, their approach, as well. AI-generated malware can   
   change faster and to a greater extent, evading traditional, signature-based   
   detection with ease.    
      
   Organizations should treat development environments as high-value targets,    
   CPR concludes. To defend, they should first strengthen phishing prevention   
   across collaboration and developer workflows. After that, they should protect   
   development and cloud environments with strong access controls and finally,   
   use AI-driven threat prevention to block unseen malware early in the attack   
   chain.    
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/more-ai-malware-has-been-found-this-tim   
   e-targeting-crypto-developers   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: Capitol City Online (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca