----------------------------------------------------------------------------------
@MSGID: 1@dont-email.me> b935e8c2
@REPLY: <yfCcnUXDlJ-nOVD5nZ2dnZfqn_ednZ2d@earthlink.com>
995f98f3
@REPLYADDR Oregonian Haruspex
<no_email@invalid.invalid>
@REPLYTO 2:5075/128 Oregonian Haruspex
@CHRS: CP866 2
@RFC: 1 0
@RFC-Message-ID: 1@dont-email.me>
@RFC-References: <20230804234940.346BD56031B@emkei.cz>
<yfCcnUXDlJ-nOVD5nZ2dnZfqn_ednZ2d@earthlink.com>
@TZUTC: -0000
@PID: NewsTap/5.5 (iPad)
@TID: FIDOGATE-5.12-ge4e8b94
23k.304 <
23k304@bfxw9.net> wrote:
> On 8/4/23 7:49 PM, Really wrote:
>> Threat actors associated with the hacking crew known as Patchwork have
>> been spotted targeting universities and research organizations in China
>> as part of a recently observed campaign.
>>
>> The activity, according to KnownSec 404 Team, entailed the use of a
>> backdoor codenamed EyeShell.
>>
>> <
https://thehackernews.com/2023/07/patchwork-hackers-target-chinese.html?m=1>
>
> Unfortunately, this sort of hacking seems to be a tit-4-tat
> cyberwar with the Chinese. They WILL come back with something
> of equal or greater impact ... PLUS they know KNOW about this
> little trick. `Patchwork` basically gave them the blueprints
> to their stealth bomber ....
>
Honeywell uploaded the F35`s blueprints to China actually.
--- NewsTap/5.5 (iPad)
* Origin: A noiseless patient Spider (2:5075/128)
SEEN-BY: 50/109 301/1 463/68 467/888 4500/1
5001/100 5005/49 5020/715 830 848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5061/133
5075/128 5083/1
@PATH: 5075/128 5020/1042 4441