Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 817 of 2,445    |
|    Mike Powell to All    |
|    Hackers claim Orange atta    |
|    19 Mar 25 09:28:00    |
      TZUTC: -0500       MSGID: 533.consprcy@1:2320/105 2c400f76       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       Hackers claim Orange attack, threaten to leak 1TB of data              Date:       Wed, 19 Mar 2025 10:18:59 +0000              Description:       This is the second attack on Orange in less than a month, both done by       ransomware actors.              FULL STORY       ======================================================================        - Ransomware operators Babuk adds Orange to their data leak site        - They claim to have broken into Orange in mid-March 2024, stealing sensitive       data        - Researchers believe there is merit to the claims              Telecom giant Orange has reportedly again been hit by a ransomware attack       after cybercriminal organization Babuk posted a data sample on its website,       claiming proof of a successful breach at the company.               The group claims to have broken into Orange on Sunday, March 16, stealing all       information related to orange.com and orange.ro from Romania.               We will publish 1TB if they do not want to negotiate with us, Babuk        apparently said on its website. And there is still a lot more that we stole,       the sample is not much.              "Very detailed information"               Babuk is not as popular as LockBit, or RansomHub, but its still a major       ransomware player, who allegedly claimed 60 victims this year alone. Its been       around for years, although with long periods of inactivity.               If the group is telling the truth, they stole 4.5TB of very detailed       information, including email addresses, customer records, source code,       internal documents, invoices, contracts, projects, tickets, user data,       employee data, messages, credit cards, call logs, and other personally       identifiable information (PII) among the stolen data.               Researchers from Cybernews reviewed the sample posted on the website and say       the claims might be credible.               The threat actor uploaded a 6.44GB Orange data sample with thousands of        Orange internal documents, Cybernews explained. Some files include employee       data, like names, usernames, email addresses, and time zones, as well as a       list of various Jira projects related to the Orange.ro domain.               In late February, Orange Group confirmed suffering a cyberattack , but said        at the time it was still looking into claims of valuable data being stolen.       This attack was claimed by a member of the HellCat ransomware application,        who also stole data belonging to Orange Romania.               Orange has not yet made any statement on the attack, but has been contacted       for comment.              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/hackers-claim-orange-attack-threaten-to       -leak-1tb-of-data              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca