home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   INTERNET      The global pornography network      2,155 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,566 of 2,155   
   August Abolins to All   
   New Malware Attack is a Work of Art   
   30 May 20 16:42:00   
   
   MSGID: 2:221/1.58@fidonet e4eb58fa   
   PID: OpenXP/5.0.44 (Win32)   
   CHRS: ASCII 1   
   TZUTC: -0400   
      
   >==================================================================<   
    ** Original area               : "/grc/security"   
    ** Original message from       : jeff@jeffroot.us (Jeff Root)   
    ** Original message to         :   
    ** Original date/time          : 30 May 20, 15:19   
   >==================================================================<   
      
   This is truly a thing of beauty.   
      
   If only they'd chosen niceness, instead of evil.   
      
   https://arstechnica.com/information-technology/2020/05/an-advanc   
   d-and-unconventional-hack-is-targeting-industrial-firms/   
      
   Whoever is behind this, is truly an artist.   
      
   Jeff   
      
   >==================================================================<   
   Excerpt from the article:   
   >==================================================================<   
      
   The attacks begin with emails that are customized for each target..   
      
   For the exploit to trigger, the language in the email must match the   
   localization of the target's operating system..   
      
   Recipients who click on a request to urgently enable the document's active   
   content will see no indication anything is amiss. Behind the scenes,   
   however, a macro executes a Powershell script. The reason it stays hidden:   
   the command parameters:   
      
       ExecutionPolicy ByPass-to override organization policies   
       WindowStyle Hidden. This hides the PowerShell window   
       NoProfile, which executes the script with no end-user configuration.   
      
   Triple-encoded steganography, anyone?   
      
   The PowerShell script reaches out to either imgur.com or imgbox.com and   
   downloads an image that has malicious code hidden inside the pixels   
   through a technique called steganography. The data is encoded by the   
   Base64 algorithm, encrypted with an RSA key, and then Base64-encoded   
   again.   
      
   In a clever move, the script contains an intentional error in its   
   code. The resulting error message that's returned-which is different for   
   each language pack installed on the OS-is the decryption key.   
      
   The decrypted and decoded data is used as a second PowerShell script that,   
   in turn, unpacks and decodes another blob of Base64-encoded data. With   
   that, a third obfuscated PowerShell script executes Mimikatz malware   
   that's designed to steal Windows account credentials used to access   
   various network resources. In the event stolen credentials include those   
   for the all-powerful Windows Active Directory, attackers have access to   
   virtually every node on the network.   
      
   >==================================================================<   
      
   --- OpenXP 5.0.44   
    * Origin:  (2:221/1.58)   
   SEEN-BY: 1/123 90/1 120/340 601 123/131 226/30 227/114 702 229/101   
   SEEN-BY: 229/424 426 452 664 1014 240/5832 249/206 317 400 292/854   
   SEEN-BY: 317/3 322/757 342/200   
   PATH: 221/1 280/464 229/101 426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca