----------------------------------------------------------------------------------
@MSGID: <yfCcnUXDlJ-nOVD5nZ2dnZfqn_ednZ2d@earthlink.com>
995f98f3
@REPLY: <20230804234940.346BD56031B@emkei.cz>
c55e3d64
@REPLYADDR 23k.304 <23k304@bfxw9.net>
@REPLYTO 2:5075/128 23k.304
@CHRS: CP866 2
@RFC: 1 0
@RFC-References:
<20230804234940.346BD56031B@emkei.cz>
@RFC-Message-ID:
<yfCcnUXDlJ-nOVD5nZ2dnZfqn_ednZ2d@earthlink.com>
@TZUTC: -0400
@PID: Mozilla/5.0 (X11; Linux x86_64; rv:78.0)
Gecko/20100101 Thunderbird/78.13.0
@TID: FIDOGATE-5.12-ge4e8b94
On 8/4/23 7:49 PM, Really wrote:
> Threat actors associated with the hacking crew known as Patchwork
have been spotted targeting universities and research organizations in
China as part of a recently observed campaign.
>
> The activity, according to KnownSec 404 Team, entailed the use of
a backdoor codenamed EyeShell.
>
> <
https://thehackernews.com/2023/07/patchwork-hackers-target-chinese.html?m=1>
Unfortunately, this sort of hacking seems to be a tit-4-tat
cyberwar with the Chinese. They WILL come back with something
of equal or greater impact ... PLUS they know KNOW about this
little trick. `Patchwork` basically gave them the blueprints
to their stealth bomber ....
--- Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.13.0
* Origin: feather germanium (2:5075/128)
SEEN-BY: 50/109 301/1 463/68 467/888 4500/1
5001/100 5005/49 5020/715 830 848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5061/133
5075/128 5083/1
@PATH: 5075/128 5020/1042 4441