Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 926 of 2,445    |
|    Mike Powell to All    |
|    Key trusted MS platform e    |
|    25 Mar 25 08:47:00    |
      TZUTC: -0500       MSGID: 646.consprcy@1:2320/105 2c47f1da       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       Key trusted Microsoft platform exploited to enable malware, experts warn              Date:       Mon, 24 Mar 2025 15:26:00 +0000              FULL STORY              Cybersecurity experts have warned Trusted Signing, Microsofts code-signing       platform, is being abused to grant malware certificates and help it bypass       endpoint protection and antivirus programs.               Certificates are digital credentials that verify the authenticity, integrity,       and security of software. They use cryptographic keys to establish secure       communications and prevent tampering or impersonation, and are considered       crucial for encrypting sensitive data, ensuring secure transactions, and       maintaining user trust. In software development, code-signing certificates       validate that an application has not been altered after release.               Microsoft describes Trusted Signing as a, fully managed, end-to-end signing       solution that simplifies the certificate signing process and helps partner       developers more easily build and distribute applications.              Lumma Stealer and others              However, BleepingComputer reports multiple researchers observing threat        actors using Trusted Signing to sign their malware with short-lived,        three-day code-signing certificates.               Software signed this way will remain valid until the certificate is revoked,       which suggests that the malware could successfully bypass security solutions       for a lot longer.               The malware samples they analyzed were signed by "Microsoft ID Verified CS        EOC CA 01," it was said.              Among the campaigns abusing Microsoft are Crazy Evil Traffers crypto heist,       and Lumma Stealer.               One of the ways Microsoft seems to be tackling this issue is to only allow       certificates to be issued under the name of a company thats been operational       for at least three years.               However, individuals can sign up and get faster approval, if the certificate       is issued under their name.               Microsoft says it is constantly monitoring the landscape and revoking       certificates that were found to have been abused.               "When we detect threats we immediately mitigate with actions such as broad       certificate revocation and account suspension. The malware samples you shared       are detected by our antimalware products and we have already taken action to       revoke the certificates and prevent further account abuse, the company noted.              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/key-trusted-microsoft-platform-exploite       d-to-enable-malware-experts-warn              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca