home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 364 of 2,445   
   Mike Powell to All   
   Chinese hackers develop e   
   06 Feb 25 10:36:00   
   
   TZUTC: -0500   
   MSGID: 69.consprcy@1:2320/105 2c0a0d68   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Chinese hackers develop effective new hacking technique to go after business   
   networks   
      
   Date:   
   Wed, 05 Feb 2025 17:50:00 +0000   
      
   Description:   
   Cybercriminals are using new backdoors for persistent access and remote code   
   execution, experts warn   
      
   FULL STORY   
   ======================================================================   
    - Security researchers observe Chinese attackers targeting network appliances   
    - The code grants them persistent access and a number of different operations   
    - Hackers could grab system details, read sensitive user data, and more   
      
   Chinese hackers have been seen targeting network appliances with malware    
   which gave them persistent access and the ability to run all sorts of    
   actions.    
      
   A new report from cybersecurity researchers Fortiguard (part of Fortinet)   
   dubbed the campaign ELF/SShdinjector.A!tr, and attributed the attack to   
   Evasive Panda, also known as Daggerfly, or BRONZE HIGHLAND, a Chinese    
   advanced persistent threat (APT) group active since at least 2012.    
      
   The group primarily engages in cyberespionage, targeting individuals,   
   government institutions, and organizations. In the past, it was seen running   
   operations against entities in Taiwan, Hong Kong, and the Tibetan community.   
   We dont know who the victims in this campaign were.   
      
   Analyzing with AI    
      
   Fortiguard did not discuss initial access, so we dont know what gave Evasive   
   Panda the ability to deploy malware. We can only suspect the usual - weak   
   credentials, known vulnerabilities, or devices already infected with   
   backdoors. In any case, Evasive Panda was seen injecting malware in the SSH   
   daemon on the devices, opening up the doors for a wide variety of actions.    
      
   For example, the hackers could grab system details, read sensitive user data,   
   access system logs, upload or download files, open a remote shell, run any   
   command remotely, delete specific files from the system, and exfiltrate user   
   credentials.    
      
   We last heard of Daggerfly in July 2024, when the group was seen targeting   
   macOS users with an updated version of their proprietary malware.  A report   
   from Symantec claimed the new variant was most likely introduced since older   
   variants got too exposed.    
      
   In that campaign, the group used a piece of malware called Macma, a macOS   
   backdoor that was first observed in 2020, but it's still not known who built   
   it. Being a modular backdoor, Macmas key functionalities include device   
   fingerprinting, executing commands, screen grabbing, keylogging, audio   
   capture, and uploading/downloading files from the compromised systems.    
      
   Fortiguard also discussed reverse engineering and analyzing malware with AI.   
   While it stressed that there were usual AI-related problems, such as   
   hallucinations and omissions, the researchers praised the tools potential.    
      
   "While disassemblers and decompilers have improved over the last decade, this   
   cannot be compared to the level of innovation we are seeing with AI," the   
   researchers said. This is outstanding!    
      
    Via BleepingComputer   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/chinese-hackers-develop-effective-new-h   
   acking-technique-to-go-after-business-networks   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca