Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 927 of 2,445    |
|    Mike Powell to All    |
|    Medusa ransomware is able    |
|    25 Mar 25 08:50:00    |
      TZUTC: -0500       MSGID: 647.consprcy@1:2320/105 2c47f1db       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       Medusa ransomware is able to disable anti-malware tools, so be on your guard              Date:       Mon, 24 Mar 2025 16:13:10 +0000              Description:       Medusa is bringing its own vulnerable driver that helps it kill EDR solutions       before deploying the encryptor.              FULL STORY       ======================================================================        - Research ers spot Medusa ransomware operators deploying smuol.sys        - This driver mimics a legitimate CrowdStrike Falcon driver        - Medusa is actively targeting critical infrastructure organizations              Operators of the Medusa ransomware are engaging in old-fashioned       bring-your-own-vulnerable-driver (BYOD) attacks, bypassing endpoint        protection , detection and response (EDR) tools while installing the       encryptor.               Cybersecurity researchers Elastic Security Labs noted the attacks start as        the threat actors drop an unnamed loader, which deploys two things on the       target endpoint: the vulnerable driver, and the encryptor.               The driver in question is smuol.sys, and it mimics a legitimate CrowdStrike       Falcon driver named CSAgent.sys. It was also said to have been signed by a       Chinese vendor the researchers dubbed ABYSSWORKER.               A growing threat              "This loader was deployed alongside a revoked certificate-signed driver from        a Chinese vendor we named ABYSSWORKER, which it installs on the victim        machine and then uses to target and silence different EDR vendors," Elastic       Security Labs said in its report.               Using outdated and vulnerable drivers to kill antivirus and malware removal       tools is nothing new. The practice has been around for years and is being        used to deploy malware, steal sensitive information, propagate viruses, and       more.               The best way to mitigate potential threats is to keep your software updated.               Medusa ransomware has grown into one of the most prolific       Ransomware-as-a-service (RaaS) providers around.               Standing shoulder to shoulder with LockBit, or RansomHub, Medusa has taken       responsibility for some of the biggest attacks in recent years, prompting the       US government to issue a warning about its activities.               In mid-March 2025, the FBI, CISA, and MS-ISAC said Medusa targeted more than       300 victims from a variety of critical infrastructure sectors, by February       2025.               "As of February 2025, Medusa developers and affiliates have impacted over 300       victims from a variety of critical infrastructure sectors with affected       industries including medical, education, legal, insurance, technology, and       manufacturing," the report says. "FBI, CISA, and MS-ISAC encourage       organizations to implement the recommendations in the Mitigations section of       this advisory to reduce the likelihood and impact of Medusa ransomware       incidents."                Via The Hacker News              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/medusa-ransomware-is-able-to-disable-an       ti-malware-tools-so-be-on-your-guard              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca