home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 998 of 2,445   
   Mike Powell to All   
   Hackers target US financi   
   28 Mar 25 10:28:00   
   
   TZUTC: -0500   
   MSGID: 723.consprcy@1:2320/105 2c4bfd1e   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Notorious Chinese hackers FamousSparrow allegedly target US financial firms   
      
   Date:   
   Thu, 27 Mar 2025 14:18:00 +0000   
      
   Description:   
   The group was though to have retired - but it was just hiding really well.   
      
   FULL STORY   
      
   FamousSparrow, a Chinese state-sponsored threat actor thought to be retired,   
   is not only active, but has been targeting government, financial   
   organizations, and research institutes, for years now, experts have revealed.    
      
   Cybersecurity researchers at ESET recently stumbled upon a new variant of   
   FamousSparrows malware , leading them down a rabbit hole exposing the group's   
   activities across the globe.    
      
   ESET said that it was brought in by an unnamed trade group in the United   
   States, operating in the financial sector, to assist with a malware    
   infection. The investigators found two previously undocumented versions of   
   SparrowDoor, FamousSparrows flagship backdoor.    
      
   SparrowDoor    
      
   ESET said that the group hasnt been heard of since 2022, which made the   
   cybersecurity community think it was inactive.    
      
   However, during that period, FamousSparrow targeted a government institution   
   in Honduras, and a research institute in Mexico.    
      
   In fact, the latter was breached just a couple of days prior to the    
   compromise in the US (both had happened in July 2024).    
      
   Both of these versions of SparrowDoor constitute marked progress over earlier   
   iterations, especially in terms of code quality and architecture, and one   
   implements parallelization of commands, ESET said.    
      
   While these new versions exhibit significant upgrades, they can still be   
   traced back directly to earlier, publicly documented versions. The loaders   
   used in these attacks also present substantial code overlaps with samples   
   previously attributed to FamousSparrow, says ESET researcher Alexandre Ct    
   Cyr, who made the discovery.    
      
   The investigators said they couldnt determine the initial infection vector,   
   but added that the company used outdated versions of Windows Server and   
   Microsoft Exchange, both of which have multiple, publicly available exploits.    
      
   Whichever vulnerability they used, FamousSparrow deployed a webshell on an    
   IIS server, gaining access and the ability to deploy additional payloads.    
      
   Besides SparrowDoor, the group used ShadowPad, and other tools capable of   
   running commands, keylogging, exfiltrating files, taking screenshots, and   
   more.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/chinese-hackers-famoussparrow-allegedly   
   -target-us-financial-firms   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca