home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 616 of 2,445   
   Mike Powell to All   
   MS Teams, other Win tools   
   04 Mar 25 19:06:00   
   
   TZUTC: -0500   
   MSGID: 330.consprcy@1:2320/105 2c2ccf72   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Microsoft Teams and other Windows tools hijacked to hack corporate networks   
      
   Date:   
   Tue, 04 Mar 2025 16:27:00 +0000   
      
   Description:   
   Hackers are using benign Windows tools in malicious attacks, resulting in the   
   deployment of advanced backdoors.   
      
   FULL STORY   
   ======================================================================   
    - Trend Micro says hackers are using Microsoft Teams to get closer to their   
   victims   
    - Through social engineering, they obtain credentials to remote desktop   
   solutions   
    - This access is then used to drop advanced backdoors   
      
   Hackers are using advanced social engineering tactics to try and get flawed   
   old .DLL files onto peoples computers which, in turn, would allow them to    
   drop backdoor malware .    
      
   A new report from cybersecurity researchers Trend Micro claims the new attack   
   starts on Microsoft Teams , where the crooks use impersonation to get close    
   to the victims and trick them into providing a certain set of credentials.   
   Through Quick Assist, or similar remote desktop tools, they gain access to    
   the devices, where they sideload flawed .DLL files using   
   OneDriveStandaloneUpdater.exe, a legitimate OneDrive update tool.    
      
   These .DLL files then allow them to drop BackConnect, a type of remote access   
   tool (RAT) that establishes a reverse connection from an infected device to    
   an attacker's server, bypassing firewall restrictions. This allows attackers   
   to maintain persistent access, execute commands, and exfiltrate data while   
   evading traditional security measures.   
      
   Commercial cloud solutions    
      
   BackConnect is apparently hosted, and distributed, using commercial cloud   
   storage tools.    
      
   Trend Micro says the attacks started in October 2024, and have mostly focused   
   on North America, where it observed 21 breaches - 17 in the US, five in    
   Canada and the UK, and 18 in Europe. The researchers didnt say if the attacks   
   were successful, or which industries they targeted most.    
      
   Since most of the tools used in this campaign are legitimate (Teams,   
   OneDriveStandaloneUpdater, Quick Assist), traditional antivirus or malware   
   protection services will not suffice. Instead, businesses must educate their   
   employees to spot social engineering attacks and report them in a timely   
   fashion. Businesses could also enforce the use of multi-factor authentication   
   (MFA) and limit access to remote desktop tools.    
      
   Finally, they should audit cloud storage configurations to prevent   
   unauthorized access, and monitor network traffic for suspicious connections,   
   especially those going to known malicious C2 servers.    
      
   Via Infosecurity Magazine   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/microsoft-teams-and-other-windows-tools   
   -hijacked-to-hack-corporate-networks   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca