home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 2389 
 Nobody to gay.lies.matter@abc.com 
 Re: Hackers are holding homosexual run S 
 28 Nov 16 17:36:18 
 
XPost: alt.california, sac.politics, alt.fan.rush-limbaugh
XPost: alt.politics.homosexuality

Gee, if it weren't that All Youse Breeders create new young
ho-ho-ho-homosexuals for us guys/Gays to prey on...

Trump that!

On Mon, 28 Nov 2016 04:00:44 +0100 (CET), "Gay Lies Matter..."
 wrote:

>San Francisco Municipal Railway riders got an unexpected
>surprise this weekend after the system’s computerized fare
>systems were apparently hacked. According to the San Francisco
>Examiner, the MUNI system had been attacked on Friday afternoon.
>
>MUNI riders were greeted with printed "Out of Service" and
>"Metro Free" signs on ticket machines on late on Friday and
>Saturday. MUNI first became aware of the intrusion on Friday,
>according to the Examiner.
>
>Computer screens at MUNI stations displayed a message: "You
>Hacked, ALL Data Encrypted. Contact For
>Key(cryptom27@yandex.com)ID:681 ,Enter." MUNI Spokesman Paul
>Rose spoke to the Examiner and noted that his agency was
>"working to resolve the situation," but refused to provide
>additional details.
>
>Reached by email, the hacker confirmed he was seeking a deal
>with MUNI to undo the damage:
>
>we don't attention to interview and propagate news ! our
>software working completely automatically and we don't have
>targeted attack to anywhere ! SFMTA network was Very Open and
>2000 Server/PC infected by software ! so we are waiting for
>contact any responsible person in SFMTA but i think they don't
>want deal ! so we close this email tomorrow!
>In September, Morphus Labs linked a hacker by the same name to a
>ransomware strain called Mamba, which employs tactics similar to
>those demonstrated against MUNI.
>
>This isn’t the first California organization to face such an
>issue: earlier this year, Hollywood Presbyterian Medical Center
>discovered that its files were being held for a $3.6 million
>ransom. Ransomware attacks typically occur when a malicious file
>is downloaded onto a computer and executed. Once a victim pays
>the demanded ransom, the files will be decrypted.
>
>Representatives of MUNI did not immediately responded to a
>request for comment. We’ll update this post if we hear more.
>
>http://www.theverge.com/2016/11/27/13758412/hackers-san-
>francisco-light-rail-system-ransomware-cybersecurity-muni

--- SoupGate/W32 v1.03
 * Origin: LiveWire BBS -=*=- UseNet FTN Gateway (1:2320/1)

<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca