Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 2,317 of 2,445    |
|    Mike Powell to All    |
|    This dangerous North Korean malware has     |
|    31 Jan 26 16:45:19    |
      TZUTC: -0500       MSGID: 2075.consprcy@1:2320/105 2de3b60a       PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       FORMAT: flowed       Labyrinth Chollima is morphing into three separate entities              One of the largest and most successful North Korean state-sponsored threat       actors has split into three separate entities, each with their own tactics,       malware tools, targets, and goals, experts have warned.              In a recent in-depth analysis, researchers from CrowdStrike expalined the move       is a strategic evolution to make Labyrinth Chollima cyberattacks more       efficient, and that the newly formed teams will continue working together.              "LABYRINTH CHOLLIMA's segmentation into specialized operational units       represents a strategic evolution that enhances the DPRK regime's ability to       simultaneously pursue multiple objectives," the researchers explained.              Fake jobs and fake employees              The three groups are now tracked as Labyrinth Chollima, Golden Chollima, and       Pressure Chollima.              The "OG" Labyrinth Chollima is mostly tasked with cyber-espionage and       intelligence gathering. Its targets include military and defense, government,       logistics, and nuclear organizations, located primarily in the US, Europe, and       South Korea.              Golden Chollima will be focusing on small fintech firms in the US, Canada,       South Korea, India, and Western Europe, with the goal of cryptocurrency theft.              Pressure Chollima has a similar task (to steal cryptos), but unlike its       partners from Golden Chollima, it focuses on centralized exchanges, and       technology companies in the west.              "PRESSURE CHOLLIMA conducted the DPRK's highest-profile cryptocurrency       heists, including the two largest cryptocurrency thefts on record,"       Crowdstrike said. "Public reporting links additional high-value thefts       ranging from $52 million USD to $120 million USD to PRESSURE CHOLLIMA based on       reused cryptocurrency wallets."              North Korean hackers are known for targeting crypto companies and using the       stolen tokens to fund their state apparatus and nuclear weapons programs.       Crowdstrike believes the goals have not changed, and that despite improving       trade relations with Russia, North Korea still "requires additional revenue       to fund ambitious military plans that include constructing new destroyers,       building nuclear-powered submarines, and launching additional reconnaissance       satellites."              These groups, together with the dreaded Lazarus Group, often create fake jobs       on LinkedIn, as well as fake job applicants, to target tech companies and       professionals, install backdoors and infostealers.              FULL STORY: https://www.techradar.com/pro/security/this-dangerous-north-korean-       malware-has-now-split-into-three-entities-for-maximum-impact              $$       --- SBBSecho 3.28-Linux        * Origin: Capitol City Online (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700       SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470       SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca