• arc@lemm.ee
    link
    fedilink
    arrow-up
    2
    ·
    20 minutes ago

    Sometimes when I’ve torrenting from a public wifi I’ll get a malicious .scr file - but since I torrent from an Android phone it can’t do anything to me.

  • mvirts@lemmy.world
    link
    fedilink
    arrow-up
    20
    ·
    17 hours ago

    And then it starts running because you set up wine with binfmt_misc, only to crash a few seconds later

    • Phoenixz@lemmy.ca
      link
      fedilink
      arrow-up
      3
      ·
      45 minutes ago

      Yeah that is not really an “OMG” vulnerability as I can also get into that machine by booting it with a USB drive, or plugging it’s drove into my own machine.

    • kattfisk@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      4
      ·
      2 hours ago

      That’s hyperbole. Such a system can be “hacked” by simply plugging in a usb-stick and booting from that instead, or dozens of other ways.

      The only reason to use GRUB authentication I can think of would be in something like a kiosk.

    • Varcour@lemm.ee
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 hours ago

      Does anyone here use GRUB authentication? If so why? What’s your threat model?

  • kamen@lemmy.world
    link
    fedilink
    English
    arrow-up
    120
    arrow-down
    3
    ·
    edit-2
    23 hours ago

    … and yet some of the same people will readily copy-paste random shell scripts into their terminal without fully understanding them.

      • RogueBanana@lemmy.zip
        link
        fedilink
        English
        arrow-up
        27
        ·
        1 day ago

        WannaCry is believed to use the EternalBlue exploit, which was developed by the U.S. National Security Agency (NSA)to attack computers running Microsoft Windows operating systems.

        Hehe

      • umbrella@lemmy.ml
        link
        fedilink
        arrow-up
        17
        ·
        edit-2
        1 day ago

        now im really tempted to try it, we have a decryptor now dont we?

        inb4 decryptor: borked

        • Kusimulkku@lemm.ee
          link
          fedilink
          arrow-up
          34
          ·
          edit-2
          1 day ago

          What works

          Encryption - Yes

          GUI - Yes

          What does not

          SMB & Network replication does not always work, may require SMB network patch.

          See: Misc Things to configure (Samba Shares)

          Some Font rendering issues.

          What was not tested

          Decryption

          Ransom Payment

          Uh oh. And giving it “platinum” even though some stuff doesn’t work and basic features weren’t tested is bullshit. I demand a retraction!

        • macniel@feddit.org
          link
          fedilink
          arrow-up
          27
          ·
          1 day ago

          Why? You don’t wanna know how well WannaCry runs via Wine? The site is perfectly harmless.

        • Anafabula@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          11
          ·
          edit-2
          1 day ago

          It’s just an entry in Wine’s AppDB, where they keep track of how well apps run on wine. Like ProtonDB, but for general applications.

          • DragonTypeWyvern@midwest.social
            link
            fedilink
            arrow-up
            8
            arrow-down
            15
            ·
            1 day ago

            Whole bunch of people trying to get me to click this sus link…

            You’re never gonna do it.

            I cast Millennial Paranoia, BOOMERS.

            GO BACK TO YOUR CHAIN EMAILS

            • Blemgo@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              3 minutes ago

              I do get that one wants to be careful when it comes to viruses, but just outright not believing others without doing your own research is just as harmful as blindly believing in something. If you don’t have precautions against websites running malicious code (e.g. ublock origin), you’re already treading on dangerous ground regardless. Doubly so if you don’t make snapshots.

              If you really want to be paranoid you can also click the link inside a USB image, or a sandbox. I would however advise doing research on winehq.org if you are running Linux, since it’s generally a good resource for running Windows apps.

            • NotSteve_@lemmy.ca
              link
              fedilink
              arrow-up
              1
              ·
              24 minutes ago

              Wine is a tool that lets you run Windows programs on Linux or MacOS and WineHQ is a database of how well certain programs or games work with it

        • Kusimulkku@lemm.ee
          link
          fedilink
          arrow-up
          6
          ·
          edit-2
          1 day ago

          It’s just to WineHQ’s AppDb, it just describes how well stuff works with Wine. It’s similar to the newer ProtonDB. Someone tested the WannaCry/WannaCrypt malware with Wine for the hell of it.

  • apex32@lemmy.world
    link
    fedilink
    arrow-up
    52
    arrow-down
    1
    ·
    1 day ago

    A friend of mine once downloaded something malicious to his Linux machine and wasn’t worried about it. Then some time later, while browsing his files from a Windows machine, saw it and was like, “hey, what’s this?” Oops.

    He’s a tech savvy guy, so I’m guessing the fact he had downloaded it himself really let his guard down.

        • kusivittula@sopuli.xyz
          link
          fedilink
          arrow-up
          2
          ·
          22 hours ago

          my problem was i couldn’t find where it is and search engines couldn’t provide an answer, but just now i learned you can find out where something is installed with

          whereis appname
          
  • lath@lemmy.world
    link
    fedilink
    arrow-up
    50
    arrow-down
    3
    ·
    1 day ago

    Modern viruses check the os before deciding which type of file to send your way.

    • LordKitsuna@lemmy.world
      link
      fedilink
      arrow-up
      56
      arrow-down
      1
      ·
      1 day ago

      This is why you use a user agent switcher to lie about being windows. It’s a form of anti malware!

      • N.E.P.T.R@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        23
        ·
        1 day ago

        Except websites can tell what base OS you run using browser fingerprinting. It os impossible to lie aboit your OS because of the differences in platforms.

          • N.E.P.T.R@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            7
            arrow-down
            3
            ·
            1 day ago

            You can lie, but that doesnt mean that a website cant still tell your base OS if they use JS platform fingerprinting. Arkenfox, the base config which Librewolf is based off of says the exact same thing. Go to CreepJS and see it get your platform regardless.

              • N.E.P.T.R@lemmy.blahaj.zone
                link
                fedilink
                English
                arrow-up
                5
                arrow-down
                3
                ·
                24 hours ago

                Firstly there is no need to be condescending.

                Secondly, do you block all JS? NoScript is not a silver bullet and doesnt stop fingerprinting, it is itself identified by the CreepJS test site. It may in this case reduce the chance of OS fingerprinting, but pure CSS methods exist as well.

                Additionally, NoScript is laregly redundant with uBlock Origin since you can do everything that it offers, such as blocking 3rd party scripts/iframes/all, block fonts, block JS, and it is very granular.

                Bottom line, you are fingerpintable.

          • N.E.P.T.R@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            3
            ·
            24 hours ago

            That isnt a great defense against malware “imho”. Security through assuming the threat actor is lazy is just not security. It doesnt take like any effort on their part to just use some off-the-shelf OS fingerprinting code. It isnt worth it either because it contributes to your overall fingerprint, since normal RFP users have a standardized useragent for Windows and Linux separately.

            • LordKitsuna@lemmy.world
              link
              fedilink
              arrow-up
              2
              ·
              22 hours ago

              Security is layers, i utilize apparmor and firejail personally. And in fact 90% of widespread malware specifically relies on lazy people. Often targets default passwords etc

            • null@slrpnk.net
              link
              fedilink
              arrow-up
              1
              ·
              21 hours ago

              That isnt a great defense against malware

              Nobody said it was a great defense.

              • N.E.P.T.R@lemmy.blahaj.zone
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                2
                ·
                21 hours ago

                It really isnt any defense. All a website can do is initiate a download, websites are sandboxed by default. You still have to run the executable, which doesnt really apply to Linux because the file will have no executable permission.

        • bamboo@lemmy.blahaj.zone
          link
          fedilink
          English
          arrow-up
          5
          ·
          1 day ago

          Generally browser fingerprinting is used to identify individual browser sessions across IP addresses. This mostly takes into account reported features and capabilities of the browser and OS to the website. Fingerprinting isn’t looking for specific info your browser reports, it’s taking it all and hashing it to get a unique id specific to the browser. Because it’s hashed, it can’t be reversed to identify the OS from the hash.

          Sure a malicious website could Ignore the user agent and probe for some hardware capabilities that are specific to Linux, but that would be a lot of effort to probe various things which are set differently across all different browsers. I can’t speak for bad actors, but I wouldn’t spend the effort to check if the user agent is spoofed, if 95% of the time it’s accurate to get the OS type.

          • N.E.P.T.R@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            2
            ·
            edit-2
            1 day ago

            It is trivial to identify OS platform because browser work differently on each platform. Wjat Librewolf does with useragent on Linux actually is makes users stand out more because it isn’t what privacy.resistFingerprinting (RFP) reports on normally.

            Hackers (like the comment scenario i was responding to) are substantially more likely to employ platform fingerprint than trust a fale useragent. And loads general websites employ fingerprinting, meaning deviation from default RFP behaviour makes you stand out (more than you already do by using RFP since it is a small pool already).

            • bamboo@lemmy.blahaj.zone
              link
              fedilink
              English
              arrow-up
              2
              ·
              23 hours ago

              Agreed, I’m not saying it’s impossible to detect the OS, but it’s even more trivial for an adversary to regex the User Agent and serve the malware for that OS. The average user doesn’t even know what a User Agent is, and that’s who the drive by malware websites are counting on to infect because they’re easy targets.

              Just like a real fingerprint, that will only identify the fingerprint to a person, not tell you that the fingerprint is from someone who is European. Fingerprints are used to track you across different websites, and build a profile of you for advertising.

              • N.E.P.T.R@lemmy.blahaj.zone
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                2
                ·
                23 hours ago

                Yeah okay.

                My logic was that it is much more likely that someone will spoof there useragent already if they are on Linux. If threat actor is targeting not just Windows but also Linux, they probably would understand the very real likelyhood of platform spoofing.

        • uid0gid0@lemmy.world
          link
          fedilink
          arrow-up
          4
          ·
          1 day ago

          Twitch.TV will tell you that you need to use a supported browser if you connect with Linux in your user agent no matter what browser you use. Changing Linux to Windows in your agent with no other changes resolves this issue.

    • dev_null@lemmy.ml
      link
      fedilink
      arrow-up
      13
      arrow-down
      3
      ·
      edit-2
      1 day ago

      Do you have any data to back up that claim? I don’t think that’s true at all, it would be very rare.

      • lath@lemmy.world
        link
        fedilink
        arrow-up
        5
        arrow-down
        1
        ·
        edit-2
        1 day ago

        Do you have any data to back up that claim?

        None whatsoever.

        I don’t think that’s true at all, it would be very rare.

        Suspicious words. You have one, don’t you? Don’t worry, I won’t tell.

        • dev_null@lemmy.ml
          link
          fedilink
          arrow-up
          4
          ·
          1 day ago

          Why suspicious? I have genuinely never read a news story about a virus sending different versions of itself to different OSs. I’m sure it happens, but it doesn’t seem common at all, and you are claiming it very matter-of-factly so I am interested to know more.

          • lath@lemmy.world
            link
            fedilink
            arrow-up
            1
            arrow-down
            2
            ·
            1 day ago

            If you haven’t come across them yet, then i might be a pioneer! Dibs on the patent!

            But your words confuse me. Either it’s not true at all or it happens. You’re sure they exist, though rare. As i said before, suspicious. You might just be one of those rare occurrences after all…

            You wish to be the first acknowledged one, no? It’s alright, you can have the honour. I’ll keep mum about it for you.

            • dev_null@lemmy.ml
              link
              fedilink
              arrow-up
              3
              ·
              1 day ago

              But your words confuse me. Either it’s not true at all or it happens.

              The idea is pretty simple, so it would be surprising if it wasn’t happening at all. But there is a huge difference between “there probably exist some examples that do that” and a sweeping statement about all of them in general.

              • lath@lemmy.world
                link
                fedilink
                arrow-up
                1
                arrow-down
                2
                ·
                23 hours ago

                and a sweeping statement about all of them in general.

                Or, hear me out here, the ones that don’t aren’t modern… Get it? Wink, wink. Nudge, nudge.

                • dev_null@lemmy.ml
                  link
                  fedilink
                  arrow-up
                  3
                  ·
                  22 hours ago

                  One could think so, but no cybersecurity experts share such opinion to my knowledge.