home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,350 of 2,445   
   Mike Powell to All   
   NGINX servers hijacked in global campaig   
   06 Feb 26 11:50:54   
   
   TZUTC: -0500   
   MSGID: 2108.consprcy@1:2320/105 2deb5a2a   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   NGINX servers hijacked in global campaign to redirect traffic   
      
   By Sead Fadilpa?i? published yesterday   
      
   Redirected traffic can be abused in multiple ways, experts warn   
      
   Cybercriminals are targeting NGINX servers, rerouting legitimate traffic   
   through their malicious infrastructure, experts have warned.   
      
   Security researchers at DataDog Security Labs found the attackers are focused   
   primarily on Asian targets in the government and education industries.   
      
   NGINX servers are software systems that sit in front of websites or apps and   
   handle incoming web traffic. They serve content, balance loads, and route   
   requests to the appropriate backend servers.   
      
   What to do with the stolen data   
      
   In the attack, the unnamed threat actors modify the NGINX configuration files   
   and inject malicious blocks that grab incoming requests. They then rewrite them   
   to include the original URL and forward traffic to domains under their control.   
   As per DataDog, this is a five-stage attack that starts with a configuration   
   injection and ends with data exfiltration.   
      
   Since no vulnerability is being abused here, and the victims still end up on   
   the pages they asked for, none is the wiser. Still, cybercriminals are getting   
   away with valuable information that can be used in different ways.  Because   
   headers are preserved, the attacker can collect IP addresses, user agents,   
   referrers, session tokens, cookies, and sometimes credentials or API keys if   
   they appear in requests. On government or .edu sites, that data is especially   
   valuable.   
      
   They can also manipulate content, selectively. Since only certain URL paths are   
   hijacked, the attacker can inject ads, phishing pages, malware downloads, or   
   fake login prompts only when they want, successfully targeting specific users,   
   regions, or time zones.   
      
   Then, there is the option of traffic monetization and resale. Clean, real user   
   traffic routed through attacker infrastructure can be sold for ad fraud, SEO   
   manipulation, click-fraud, or used to boost other malicious services, which is   
   a common practice in large-scale proxy ecosystems.   
      
   Finally, compromised NGINX servers can be used to proxy attacks against other   
   targets, effectively masking their origins.   
      
   Via BleepingComputer   
      
      
   https://www.techradar.com/pro/security/nginx-servers-hijacked-in-global-campaig   
   n-to-redirect-traffic   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: Capitol City Online (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca