Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 751 of 2,445    |
|    Mike Powell to All    |
|    US warns Medusa ransomwar    |
|    14 Mar 25 18:31:00    |
      TZUTC: -0500       MSGID: 466.consprcy@1:2320/105 2c39f451       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       US government warns Medusa ransomware has hit hundreds of critical       infrastructure targets              Date:       Fri, 14 Mar 2025 14:03:00 +0000              Description:       Medusa ransomware has been around since 2021, targeting more than 300        critical infrastructure firms, CISA warns.              FULL STORY       ======================================================================        - FBI, CISA, and MS-ISAC publish new report on Medusa ransomware        - They claim the group struck hundreds of critical infrastructure firms        - Agencies share advice on how to stay safe              Hundreds of critical infrastructure targets have fallen victim to Medusa       ransomware over the last four years, a new US government report has warned,       urging organizations to apply known mitigations and minimize the risk of an       attack.               The Federal Bureau of Investigation, the US Cybersecurity and Infrastructure       Security Agency (CISA), and the Multi-State Information Sharing and Analysis       Center (MS-ISAC), have issued a joint report saying more more than 300       organizations in the critical infrastructure sector have already fallen prey       to the infamous group.              "As of February 2025, Medusa developers and affiliates have impacted over 300       victims from a variety of critical infrastructure sectors with affected       industries including medical, education, legal, insurance, technology, and       manufacturing," the report says. "FBI, CISA, and MS-ISAC encourage       organizations to implement the recommendations in the Mitigations section of       this advisory to reduce the likelihood and impact of Medusa ransomware       incidents."               The recommendations include mitigating known vulnerabilities and making sure       operating systems, software, and firmware are patched on time, segmenting       networks to hinder attempts at lateral movement, and filtering network        traffic by blocking access from untrusted origins.               Medusa first emerged in 2021, but since it was originally intended to be a       closed ransomware variant, its success was somewhat limited. A few years       later, the operation evolved into a Ransomware-as-a-Service (RaaS) with an       affiliate model, which propelled it into one of the most dangerous variants       out there.               "Medusa developers typically recruit initial access brokers (IABs) in       cybercriminal forums and marketplaces to obtain initial access to potential       victims," the report claims. "Potential payments between $100 USD and $1       million USD are offered to these affiliates with the opportunity to work       exclusively for Medusa."               Some of the more notable victims include the Minneapolis Public School       District, which suffered a significant breach resulting in the exposure of       sensitive information such as psychological reports and abuse allegations.       Other affected sectors encompass healthcare, manufacturing, technology,        legal, insurance, and education industries.                Via BleepingComputer              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/us-government-warns-medusa-ransomware-h       as-hit-hundreds-of-critical-infrastructure-targets              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca