Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 949 of 2,445    |
|    Mike Powell to All    |
|    Multi-platform ransomware    |
|    26 Mar 25 09:13:00    |
      TZUTC: -0500       MSGID: 670.consprcy@1:2320/105 2c4944e7       PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0       TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       This dangerous new ransomware is hitting Windows, ARM, ESXi systems              Date:       Tue, 25 Mar 2025 14:04:00 +0000              Description:       VanHelsing variant works across different platforms, including Windows and       Linux.              FULL STORY              A new dangerous ransomware variant has been spotted, capable of encrypting       Windows devices, Linux, VMware, ESXi systems, and more.               Cybersecurity researchers Check Point revealed the malware is called       VanHelsing, and works on a service model (Ransomware-as-a-Service).               The RaaS operation kicked off on March 7, 2025, and the encryptor is still       under development. So far, multiple infections were spotted, and the       researchers managed to analyze a few variants, all on the Windows platform.       Between them, there were incremental updates, it was said, proving VanHelsing       is being actively - and quickly - developed.               Russian group?              So far, three organizations fell victim to VanHelsing, each being asked for       $500,000 in crypto, in exchange for the decryption key. We dont know if the       affiliates also engage in data exfiltration, but its safe to assume they do.               Check Point also said there appears to be different rules for wanna-be       affiliates. Those that are newcomes to the cybercriminal scene need to pay a       $5,000 fee to be included as an affiliate. More established names in the        scene dont have to pay at all.               Splitting the proceeds favors the affiliates, it was further explained. Its        an 80-20 split, with 20% going to the ransomwares operators.               As for attribution, the operation is most likely Russian, since it is not       allowed to target organizations in Russia or the Commonwealth of Independent       States (former Soviet Union, basically).               "This is difficult to say, but usually they are operating under Russian       territory," noted Antonis Terefos, a malware reverse engineer at Check Point.               The researchers also hinted the Russian government does not target       cybercriminals, as long as they only attack organizations in the West.               If that really is the case, and VanHelsing is allowed to work freely, it can       quickly become a prolific threat actor, rivaling the likes of LockBit, or       RansomHub. Furthermore, it will become obvious that ransomware has become a       tool in global power struggles, something weve seen North Korea doing for       years now.                Via The Register              ======================================================================       Link to news story:       https://www.techradar.com/pro/security/this-dangerous-new-ransomware-is-hittin       g-windows-arm-esxi-systems              $$       --- SBBSecho 3.20-Linux        * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30       SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664       SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca