赛派号

天王手表哪里的牌子 Fake MAS Windows Activation Domain Used To Spread PowerShell Malware

If you are still tethering yourself to proprietary software and anti cheat enshittified games

The reason for malware is has nothing to do with the fact that Windows is proprietary. Linux users are just as much subject to these kind of attacks.

The main issue is that Windows ships with admin/dev tools such as Powershell, Start+Run, and command prompt - that Windows users do not understand, but social engineering attacks can persuade the users to do dangerous things. Such as paste clipboard commands into it.Linux does not improve in this area... in fact; Linux makes it worse.

Sure; Windows Powershell:

irm (URL) | iex from a Powershell prompt is dumb shit.

URL can be Easily typo'd, and there is no verification or confirmation. It's blind trust and run arbitrarily whatever comes in over HTTPS.

But Linux users will follow instructions to do something that is just as much dumb shit called:

curl (https://linkshortner) | bash

Or even dumber:

curl (URL) | sudo bash

curl (URL) | pkexec bash

Whatever.

If you think for a minute the same kind of typosquating and ClickFix exploits are not actively exploiting Unix/Linux users too, then I got extremely bad news for you. Linux may actually fare worse than Windows in this area. At least in the Windows world - a couple more manual steps are usually required to elevate.

版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容, 请发送邮件至lsinopec@gmail.com举报,一经查实,本站将立刻删除。

上一篇 没有了

下一篇没有了