home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 321 of 2,445   
   Mike Powell to All   
   Salt Typhoon exploit had   
   28 Jan 25 12:39:00   
   
   TZUTC: -0500   
   MSGID: 25.consprcy@1:2320/105 2bfe4c7f   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   One of the biggest flaws exploited by Salt Typhoon hackers has had a patch   
   available for years   
      
   Date:   
   Mon, 27 Jan 2025 15:30:28 +0000   
      
   Description:   
   The group behind the notorious Treasury hack regularly exploits this   
   vulnerability, but it had a simple fix.   
      
   FULL STORY   
   ======================================================================   
    - A security vulnerability in Microsoft Exchange servers remains largely   
   unpatched   
    - A fix was issued four years ago, but some users clearly didn't update   
    - This flaw may have aided the hacking group Salt Typhoon   
      
   Critical security vulnerabilities seem to be a regular occurrence in   
   technology reporting, with countless patches and updates to keep track of -   
   but this Microsoft Exchange Server flaw might be one to take very seriously.    
      
   Most of us will be familiar with the major incident in which 9 US telecom   
   giants were breached in what appeared to be a Chinese state sponsored   
   cyber-espionage campaign. The attack, attributed to hacking group Salt   
   Typhoon, is said to have, at least in part, exploited a known critical   
   security flaw in Microsoft Exchange Server.    
      
   The vulnerability, nicknamed ProxyLogon, was disclosed by Microsoft in 2021,   
   and a patch has been available for 4 years. Despite this, cyber-risk   
   management company Tenable has calculated in nearly 30,000 instances affected   
   by ProxyLogon, 91% remain unpatched.   
      
   CISA guidance    
      
   The US Cybersecurity and Infrastructure Security Agency (CISA) previously   
   released in-depth guidance on strengthening visibility and hardening systems   
   and devices in response to the breach, and have emphasized end-to-end   
   encryption for secure communications.    
      
   The ProgyLogon is one of five commonly exploited vulnerabilities used by Salt   
   Typhoon. Others include Ivanti Connect Secure Command Injection and   
   Authentication Bypass vulnerabilities, as well as a Sophos Firewall Code   
   Injection Vulnerability.    
      
   In light of this, the recommendation and advice for any security teams out   
   there is to always patch where available, and keep as up to date as possible   
   on any software for potential vulnerabilities or fixes.    
      
   In light of the vulnerabilities exposed by Salt Typhoon, we need to take   
   action to secure our networks said Federal Communications Commission   
   Chairwoman Jessica Rosenworcel.    
      
   Our existing rules are not modern. It is time we update them to reflect   
   current threats so that we have a fighting chance to ensure that   
   state-sponsored cyberattacks do not succeed. The time to take this action is   
   now. We do not have the luxury of waiting.   
      
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/one-of-the-biggest-flaws-exploited-by-s   
   alt-typhoon-hackers-has-had-a-patch-available-for-years   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca