home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 538 of 2,445   
   Mike Powell to All   
   Devices hijacked to botne   
   01 Mar 25 12:55:00   
   
   TZUTC: -0500   
   MSGID: 252.consprcy@1:2320/105 2c288295   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Cisco, ASUS, QNAP, and Synology devices hijacked to major botnet   
      
   Date:   
   Fri, 28 Feb 2025 16:14:00 +0000   
      
   Description:   
   The goal of the botnet has not yet been determined, but many devices are    
   under threat.   
      
   FULL STORY   
   ======================================================================   
    - Sekoia spots hackers abusing a known flaw in Cisco devices   
    - This leads to the discovery of a botnet called PolarEdge   
    - Most victims are found in the US, but the botnet is "most prevalent" in   
   Asia and South America   
      
   A previously-undocumented botnet has been expanding around the world for more   
   than a year, targeting a range of Cisco, ASUS, QNAP, and Synology devices,   
   experts have warned.    
      
   Cybersecurity researchers Sekoia observed the attacks on their honeypot, and   
   used the information to detail the campaign, its infrastructure, and targets.    
      
   In its report , Sekoia said that as of late 2023, it spotted an unnamed    
   threat actor targeting devices vulnerable to CVE-2023-20118 - an improper    
   user input validation bug affecting different Cisco Small Business Routers.   
   The flaw allowed them to execute arbitrary commands on the affected devices,   
   pulling a malicious payload from a Huawei Cloud server located in Singapore.   
   Digging deeper, Sekoia found traces of the campaign targeting devices from   
   other manufacturers, as well. They named the botnet PolarEdge, and confirmed   
   that at least 2,000 endpoints around the world were infected.   
      
   Endgame unknown    
      
   The botnets goal is unknown at this time, the researchers said.    
      
   The purpose of this botnet has not yet been determined. Cross-checking the IP   
   addresses with our telemetry has not revealed any specific activity, the   
   report reads.    
      
   Usually, cybercriminals would develop a network of infected devices to either   
   run Distributed Denial of Service (DDoS) attacks, set up a residential proxy,   
   run spam and phishing campaigns, spread malware, or engage in click fraud.    
      
   The majority of the victims are found in the US, but Sekoia says the botnet   
   appears to be particularly prevalent in Asia and South America, although it   
   cannot be certain if this was a deliberate move by the attackers, or just   
   coincidence.    
      
   Despite infecting a relatively small amount of devices, Sekoia still deemed   
   PolarEdge a dangerous threat.    
      
   The botnet exploits multiple vulnerabilities across different types of   
   equipment, highlighting its ability to target various systems, the report   
   concludes.    
      
   The complexity of the payloads further underscores the sophistication of the   
   operation, suggesting that it is being conducted by skilled operators. This   
   indicates that PolarEdge is a well-coordinated and substantial cyber threat.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/cisco-asus-qnap-and-synology-devices-hi   
   jacked-to-major-botnet   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca