71 points

If you run random .pdf.something-files pm‘d to you on LinkedIn you probably shouldn’t use a computer anyway, no matter if it runs Linux or Windows…

permalink
report
reply
32 points

Lazarus’ Operation DreamJob, also known as Nukesped, is an ongoing operation targeting people who work in software or DeFi platforms with fake job offers on LinkedIn or other social media and communication platforms.

Looks like they’re going after desperate job seeking crypto bros. Even if it’s not terribly effective, it’s a spray and pray, so they probably got some people.

permalink
report
parent
reply
19 points

Seems to me like they are targeting people who likely have access to assets that can be easily stolen and hard to track.

permalink
report
parent
reply
23 points

The problem is, using a computer is pretty much essential to function in this world, I actually know more people who would run any file sent to them without a second thought because they wouldn’t know better, but they still need to use a computer.

I think a better solution is to give better training to people about computer hygiene at the workplace.

permalink
report
parent
reply
8 points

I work for a large IT company so we’ve had numerous such training courses, but then they use third party services for time reporting, manager evaluation, cloud services, personal finance advice, etc. so I regularly get emails with links to domains that I’ve never heard about that I’m supposed to trust…

permalink
report
parent
reply
5 points

That’s what happens when executives don’t listen to IT…

The company I currently work for host everything at the building they own. The CEO doesn’t understand much about IT, but his attitude is “I trust your integrity and your expertise, so I’ll approve anything you ask me within reason if it will improve security and reliability.”

permalink
report
parent
reply
7 points

I work in a big international company. We regularly have phishing (email) awareness training. But they outsource about everything and regularly change the providers. So we often get totally legit emails from just some random companies and are supposed to visit/ login to some previously unknown domains.

permalink
report
parent
reply
6 points
*

Yeah, i teached my dad (not interested in IT at all) what weird urls in E-Mails look like and he has less spam now. Still 500 unread mails in inbox though.

permalink
report
parent
reply
9 points

Can’t get phished via email if you never open any emails.

permalink
report
parent
reply
5 points

Exactly, there a bunch of really low hanging fruits that can mitigate most of the risk for non-techy people.

permalink
report
parent
reply
31 points

So doesn’t the user have to add +x to run this?

permalink
report
reply
29 points

It never occurred to me before reading this comment that there actually is a use case for the execute permission. To me it was always just this annoying thing I have to do whenever I download an executable which I didn’t have to do on Windows.

permalink
report
parent
reply
11 points

Fun fact, Windows has the same permission it just defaults to enabled.

permalink
report
parent
reply
27 points
*

No because the zip archive retains permissions of the contained files.

permalink
report
parent
reply
35 points

Hm, maybe there should be an option to always disable the executable permission when extracting

permalink
report
parent
reply
3 points

That’s perhaps possible, but likely would have to be implemented in each achieving tools individually.

permalink
report
parent
reply
3 points

Ah, right

permalink
report
parent
reply
2 points
*

Zip too? I thought only on Windows, while tar retains unix permissions.

permalink
report
parent
reply
2 points
*

All archive formats do it, afaik.

permalink
report
parent
reply
32 points

Joke’s on them, I don’t use bash.

Seriously though, Linux will probably get targeted more frequently now that it is becoming more popular as a desktop OS.

permalink
report
reply
15 points

But you probably have Bash? In this case, #!/bin/bash still runs it.

permalink
report
parent
reply
14 points

Yeah but according to the article it installs itself in .bash_profile.

permalink
report
parent
reply
10 points
*

Ok, you got me, i’ve only read the title.

Still good to make people aware of that, i think.

permalink
report
parent
reply
25 points

how someone working on software and tech opens a file called “HSBC job offer.pdf.zip” is beyond me…

permalink
report
reply
11 points
*

Still the exploit is easier to avoid compared to windows viruses and stuff. Even with the linux popularity increasing there is already out there good solutions to prevent this kinda stuff like have SELinux installed, use firejail to run suspicious files, use proxies to visit weird sites (you can use proxychains + tor, a bit overkill but works if you don’t have a local proxy), etc.

Not to mention that one of the attack vectors of this exploit requires using a systemd feature which is the sysnetd which isnt going to work on other init systems. Reason why a lot of times minimalism can be superior to just having all the features + unnecessary ones out of the box.

permalink
report
reply

Linux

!linux@lemmy.ml

Create post

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Community stats

  • 8K

    Monthly active users

  • 6.4K

    Posts

  • 175K

    Comments