Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 642 of 2,445    |
|    Mike Powell to All    |
|    Ransomware criminals are    |
|    06 Mar 25 08:56:00    |
      TZUTC: -0500       MSGID: 356.consprcy@1:2320/105 2c2ee491       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       Ransomware criminals are now sending their demands...by snail mail?              Date:       Wed, 05 Mar 2025 16:33:00 +0000              Description:       That's one way to bypass spam filters.              FULL STORY              The security world appears to have come full circle, as spam mail has once       again gotten physical with scammers sending their victims snail mail.               Cybersecurity outlet GuidePoint recently came across a couple of these        letters sent to members of the target organizations executive team.               The letters are not your typical extinct spam, either - but claim to have        been sent by the BianLian ransomware group.              There is no ransomware               I regret to inform you that we have gained access to [REDACTED] systems and       over the past several weeks have exported thousands of data files, including       customer order and contact information, employee information with IDs, SSNs,       payroll reports, and other sensitive HR documents, company financial       documents, legal documents, investor and shareholder information, invoices,       and tax documents, the letter reads.               Your network is insecure and we were able to gain access and intercept your       network traffic, leverage your personal email address, passwords, online       accounts and other information to social engineer our way into [REDACTED]       systems via your home network with the help of another employee.               The researchers said that the attacks are as fake as the letters. There is no       evidence of any compromise whatsoever, and the letters contents bear no       resemblance to the BianLian ransomware operation. Even the wording of the       message is inconsistent with ransom notes BianLian was seen sending in the       past, they said.               In any case, the scammers were demanding $250,000 to $350,000, to be paid in       Bitcoin, within ten days. The letter also included a QR code leading to the       Bitcoin address, but its freshly generated so its impossible to determine if       it really belongs to BianLian or not.               The return address for the letters is in Boston, USA, and according to The       Register , points to a real address for an office building.                Via The Register              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/ransomware-criminals-are-now-sending-th       eir-demands-by-snail-mail              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca