home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 642 of 2,445   
   Mike Powell to All   
   Ransomware criminals are   
   06 Mar 25 08:56:00   
   
   TZUTC: -0500   
   MSGID: 356.consprcy@1:2320/105 2c2ee491   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Ransomware criminals are now sending their demands...by snail mail?   
      
   Date:   
   Wed, 05 Mar 2025 16:33:00 +0000   
      
   Description:   
   That's one way to bypass spam filters.   
      
   FULL STORY   
      
   The security world appears to have come full circle, as spam mail has once   
   again gotten physical with scammers sending their victims snail mail.    
      
   Cybersecurity outlet GuidePoint recently came across a couple of these    
   letters sent to members of the target organizations executive team.    
      
   The letters are not your typical extinct spam, either - but claim to have    
   been sent by the BianLian ransomware group.   
      
   There is no ransomware    
      
   I regret to inform you that we have gained access to [REDACTED] systems and   
   over the past several weeks have exported thousands of data files, including   
   customer order and contact information, employee information with IDs, SSNs,   
   payroll reports, and other sensitive HR documents, company financial   
   documents, legal documents, investor and shareholder information, invoices,   
   and tax documents, the letter reads.    
      
   Your network is insecure and we were able to gain access and intercept your   
   network traffic, leverage your personal email address, passwords, online   
   accounts and other information to social engineer our way into [REDACTED]   
   systems via your home network with the help of another employee.    
      
   The researchers said that the attacks are as fake as the letters. There is no   
   evidence of any compromise whatsoever, and the letters contents bear no   
   resemblance to the BianLian ransomware operation. Even the wording of the   
   message is inconsistent with ransom notes BianLian was seen sending in the   
   past, they said.    
      
   In any case, the scammers were demanding $250,000 to $350,000, to be paid in   
   Bitcoin, within ten days. The letter also included a QR code leading to the   
   Bitcoin address, but its freshly generated so its impossible to determine if   
   it really belongs to BianLian or not.    
      
   The return address for the letters is in Boston, USA, and according to The   
   Register , points to a real address for an office building.    
      
    Via The Register   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/ransomware-criminals-are-now-sending-th   
   eir-demands-by-snail-mail   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca