home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 657 of 2,445   
   Mike Powell to All   
   Hackers spotted using uns   
   07 Mar 25 09:39:00   
   
   TZUTC: -0500   
   MSGID: 371.consprcy@1:2320/105 2c303e7f   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Hackers spotted using unsecured webcam to launch cyberattack   
      
   Date:   
   Fri, 07 Mar 2025 12:33:00 +0000   
      
   Description:   
   Security researchers explain how a company with EDR ended up hacked and its   
   infrastructure encrypted.   
      
   FULL STORY   
      
   Criminals from the Akira ransomware group have been found using an unsecured   
   webcam to launch their attack and encrypt their targets entire network.    
      
   This is according to cybersecurity researchers S-RM, who found the threat   
   actors first accessed their targets remote access solution, either by   
   brute-forcing the login credentials, or buying them off the black market.    
   From there, they installed AnyDesk to pivot to other devices on the network,   
   establish persistence, and steal sensitive data.    
      
   Then, they tried to deploy the encryptor for Windows, but were stopped by the   
   companys Endpoint Detection and Response (EDR) mechanism. After hitting this   
   roadblock, Akira looked for other devices, outside EDRs watchful eye, and   
   found a live webcam vulnerable to remote shell access.   
      
   Avoidable incident    
      
   The webcam ran on a different operating system based on Linux, allowing Akira   
   to use its Linux encryptor. Speaking to BleepingComputer , S-RM said Akira   
   used the webcam to mount Windows Server Message Block (SMB) network shares of   
   the company's other devices. Then, they encrypted the network shares over    
   SMB, successfully working around EDR.    
      
   "As the device was not being monitored, the victim organization's security   
   team were unaware of the increase in malicious Server Message Block traffic   
   from the webcam to the impacted server, which otherwise may have alerted   
   them," S-RM said.    
      
   To make matters worse, S-RM confirmed that a fix for the webcam was    
   available, meaning the entire attack could have been avoided with timely   
   patching.    
      
   Other details were not disclosed, so we dont know who the victims were, or   
   what type of files Akira stole in this attack. We also dont know if the   
   company paid any ransom demands, or if the stolen files made it to the dark   
   web.    
      
   Next to the infamous LockBit, Akira remains one of the bigger ransomware   
   threats out there, so users should be on their guard.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/hackers-spotted-using-unsecured-webcam-   
   to-launch-cyberattack   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca