The Malware So Tricky Even Programmers Fall For It

Sdílet
Vložit
  • čas přidán 22. 05. 2024
  • Sponsored: Discover the new Bitdefender Scamio (Free, easy-to-use AI chatbot for detecting and preventing scams): www.bitdefender.com/solutions...
    ▼ Time Stamps: ▼
    0:00 - Intro
    0:27 - What Are Hackers Doing This Time?
    0:45 - A Very Good Thing
    2:07 - The Hacker's 1st Technique
    4:20 - The 2nd Technique
    6:32 - Some General Tips
    ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
    • My Gear & Equipment ⇨ kit.co/ThioJoe
    • Merch ⇨ teespring.com/stores/thiojoe
    • My Desktop Wallpapers ⇨ thiojoe.art/
    ⇨ / thiojoe
    ⇨ / thiojoe
    ⇨ / thiojoetv
    ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
  • Věda a technologie

Komentáře • 665

  • @cindrmon
    @cindrmon Před 2 měsíci +823

    new fear unlocked: unicode period pretending to be a file extension separator

    • @WindowsDaily
      @WindowsDaily Před 2 měsíci +54

      on windows, no extension would say what do you want to do with this file with no extention, notepad, paint? so we're probably safe, jut linux users to worry about.

    • @cindrmon
      @cindrmon Před 2 měsíci +43

      @@WindowsDaily but.. i am a linux user...

    • @x-user3462
      @x-user3462 Před 2 měsíci

      Just use bind mount with noexec option for you downloads directory.
      $ cat /etc/fstab | tail -n1
      /home/x-user/downloads /home/x-user/downloads none bind,noexec,nofail,x-systemd.device-timeout=2 0 0

    • @vnc.t
      @vnc.t Před 2 měsíci +46

      ​@@cindrmonmost file managers have a setting to show a "do you want to run this file" popup when doubleclicking executables

    • @shallex5744
      @shallex5744 Před 2 měsíci +2

      @@cindrmon what would that do? file names don't mean anything, so that wouldn't change the functionality of the file, would it?

  • @GeekIWG
    @GeekIWG Před 2 měsíci +1052

    Of note on modern Linux desktops (at least in Gnome and KDE), file managers will ask before executing files by default, so remember to keep that option enabled!

    • @AlfiesFuntime
      @AlfiesFuntime Před 2 měsíci +51

      Maybe newer versions of GNOME/Plasma should make it more clear because some people just click ok on popups
      It is already quite clear but if people are doing this it means it works, which isn't good.

    • @GeekIWG
      @GeekIWG Před 2 měsíci +24

      @@AlfiesFuntime Isn't that the truth. Also wish KDE would get rid of that "Don't ask me again" checkbox.

    • @felixjohnson3874
      @felixjohnson3874 Před 2 měsíci +55

      One issue is the KDE dialog has a rather stupid "don't ask again" checkbox. Sounds reasonable right? Yeah, no. "Don't ask again" means "never ask me how I want to run an executable ever again" not "don't ask me about running this executable again". Clicking that checkbox once permanently turns off that security measure completely unless you specifically reenable it, after which you need to deal with the pop up everytime you want to run any executable directly, even if you trust it.

    • @felixjohnson3874
      @felixjohnson3874 Před 2 měsíci +14

      ​​​​@@AlfiesFuntimenope. Its purpose is to clarify the action that will be taken, not protect people from themselves. If you don't read the warnings thats your problem. Its there to tell/ask you whether to run the executable, not protect you from yourself if you don't read warnings.
      Fool-proof is one thing, but Linus-proofing is a futile effort that just makes the UX worse for no reason. Linus proved pretty plainly that if you're willing to ignore one warning you're willing to ignore 5 more.

    • @felixjohnson3874
      @felixjohnson3874 Před 2 měsíci +36

      ​@@GeekIWGthey can keep the checkbox, they just need to make it file-specific. If a user wants to turn it off completely put that setting somewhere else, but the pop-up checkbox should be "Don't ask me again for this file" because as it currently is it's unacceptably ambiguous.

  • @LordZordid
    @LordZordid Před 2 měsíci +362

    30 years experience in IT and I can honestly say that I might have fallen for it.

    • @typingcat
      @typingcat Před 2 měsíci

      I would have checked the file with VirusTotal, even if it actually had ".pdf" extension, because PDF files can contain viruses, and I don't trust any e-mail attachment, even if it came from a legitimate source, because that person could not know that his PC is infected.

    • @CoreDump451
      @CoreDump451 Před 2 měsíci +21

      Yup, especially the first one.
      I think it says a lot about our industry practices (using npm without care).

    • @williamdrum9899
      @williamdrum9899 Před 2 měsíci

      Especially how unicode has devolved into a diarrhea of gotchas. Namely, by allowing it to mix with ASCII

  • @DiamondSaberYT
    @DiamondSaberYT Před 2 měsíci +229

    Plot twist: the job application is for a cybersecurity position, and their challenge is to not fall for the less obvious hacks

    • @sayven
      @sayven Před 2 měsíci +8

      Nice idea but obviously it would still be illegal

    • @__christopher__
      @__christopher__ Před 2 měsíci +30

      @@sayvenMaybe the cybersecurity position is actually hiring black-hat hackers. So the first test does double-duty: If you detect the problem, you get to the next round. If you don't, they still profit from you.

    • @abdirahmann
      @abdirahmann Před 2 měsíci +13

      @@__christopher__ This is mad clever fr

    • @cryptoafc7655
      @cryptoafc7655 Před 2 měsíci

      bruh mind blowing

  • @madcow3417
    @madcow3417 Před 2 měsíci +322

    4:09 That malicious package has 285k downloads. I probably would have trusted it too... Although the description starts with 'A' instead of 'An', so maybe not so much.
    That pdf executable is really smart.

    • @Combineboy
      @Combineboy Před 2 měsíci

      So people who make a grammar mistake are automatically people giving you a virus?

    • @_denzy_6310
      @_denzy_6310 Před 2 měsíci +1

      I wouldn't even trust a download counter. I'll have to run the file through file command

    • @lastyhopper2792
      @lastyhopper2792 Před 2 měsíci

      The download counter is a trophy for the hacker who made that tactic.

  • @xanzut
    @xanzut Před 2 měsíci +77

    The malicious NPM is really scary, you will get hacked even before run the code. There's a something called "preinstall script" in NPM which is will be executed when downloading the package. This is known technique for attack called "Dependency Confusion"

    • @ilsavv
      @ilsavv Před 2 měsíci +2

      This is terrible and hopeless!

    • @markusklyver6277
      @markusklyver6277 Před 2 měsíci

      I don't think the preinstall script runs the code though.

    • @xanzut
      @xanzut Před 2 měsíci

      @@markusklyver6277 there's a lot of article explaining about Dependency Confusion, read and understand it

  • @lint2023
    @lint2023 Před 2 měsíci +61

    I had a scam from a "recruiter" once where they wanted me to set up an account with them and they required a password to be my last four SS number. That flagged me and they held firm after I called them out on it. I also held firm. It was a major known corp that I wanted to work for, but I still believe it was a scammer working through the resume sites.

    • @edwardmacnab354
      @edwardmacnab354 Před 2 měsíci +5

      some places like Capital One ask you to enter your SS # but it is optional

    • @eric_d
      @eric_d Před 2 měsíci

      @@edwardmacnab354It's ALWAYS optional to use your SS# for anything that doesn't directly deal with your employment or personal taxes. Even banks can't require your SS#, even though most of their employees have been trained to tell you that the patriot act requires them to get it from you. It's actually illegal, in most cases, for them to even ask for it. I ran into a situation several years back when I was given a corporate debit card so I could withdraw money to pay for vehicles. Wells Fargo gave me a huge issue over refusing to give them my SS# for a few weeks, but after consulting with their legal department, they told me that I was 100% correct about everything that I told them, and they gave me the card. Even if it had been an interest bearing account, it would not have directly, or even indirectly, been related to MY taxes. The only impact on taxes would have been on the company I worked for. I had an AMEX card, and cards from BoA, Wells Fargo, and TD bank, all with my name and the company name on them, and I never gave any of them my SS#, because you're NEVER supposed to give that to anyone except your employer and whoever is doing your taxes.

  • @rphilipsgeekery4589
    @rphilipsgeekery4589 Před 2 měsíci +263

    It's scary they are targeting software Devs they could infect thier releases

    • @soulstenance
      @soulstenance Před 2 měsíci +34

      Another good reason to sign your commits and software packages!

    • @dingokidneys
      @dingokidneys Před 2 měsíci +24

      Possibly hunting for access to a good supply chain, e.g. Solarwinds or Linux kernel contributors.

    • @FlooferLand
      @FlooferLand Před 2 měsíci +9

      @@dingokidneys luckily the kernel is safe since everything has to pass through Linus before getting merged

    • @dingokidneys
      @dingokidneys Před 2 měsíci +15

      @@FlooferLand I have great faith in the kernel development team and of course Linus, but if bad actors keep nibbling at the edges there's a possibility that something nefarious could creep in, if not all at once, in little bits over time. Nation State actors play the long game so we have to be on our toes at all times.
      The fact that some binary BLOBS of proprietary software are accepted in drivers, like the official nVidia driver, means that if someone can get into the nVidia driver team, they could possibly sneak something effectively into the kernel without review by the kernel team. This is why Stallman and Debian (previously) were so adamant about keeping proprietary software, especially that where the source was not open, out of the ecosystem.

    • @boulderbash19700209
      @boulderbash19700209 Před 2 měsíci +1

      Not just them. Any "company" may ask you to download some form for their rebate or promotion.

  • @dontmindme8709
    @dontmindme8709 Před 2 měsíci +27

    Malware targeting Linux users? Wow, the year of the Linux desktop is truly upon us!
    Though seriously, thanks for spreading the word on these scams! This could easily fool anyone

    • @notNajimi
      @notNajimi Před měsícem

      That’s unironically very encouraging in regards to the future of Linux in the home. Adoption of Linux is getting high enough for attackers to target end-users and not just servers

    • @SpyrosFilippopoulos
      @SpyrosFilippopoulos Před 2 dny

      I fear the day i have to use an antivirus on linux

  • @yuu-kun3461
    @yuu-kun3461 Před 2 měsíci +62

    A new linux thing was a fake Exodus snap package, which asked people to input their 12-words phrase to import wallet. Then of course, the crypto got stolen.

    • @LordZordid
      @LordZordid Před 2 měsíci

      The money was spent on a diamond encrusted gold toilet for Kim Jong Un. It's very lavish but awfully painful to sit on. Being a dictator has it's costs.

    • @shinobuoshino5066
      @shinobuoshino5066 Před 2 měsíci +2

      as if anyone needed more reasons to avoid flatshit, snapshit and other kinds of shit

    • @fluf201playz
      @fluf201playz Před 2 měsíci +1

      @@shinobuoshino5066 holy shit

    • @orngjce223
      @orngjce223 Před měsícem

      ​@@shinobuoshino5066 If you don't like Flatpak or Snap, that's fine. And Snap has closed-source elements, which is also perfectly reasonable to dislike. But the original intention behind Flatpak is that it is on average more secure because the installer never has to leave userspace.

  • @vpun215
    @vpun215 Před 2 měsíci +88

    as a programmer, i can confirm that i would 110% fall for this malware.

    • @dvorakgigachad1444
      @dvorakgigachad1444 Před 2 měsíci +3

      first one, probably.. second one, very unlikely

    • @vpun215
      @vpun215 Před 2 měsíci

      @@dvorakgigachad1444 ma mans a giga

    • @Azertyyys
      @Azertyyys Před 2 měsíci +2

      Printing hello world doesnt make you a programmer

  • @4WheelerinMiami
    @4WheelerinMiami Před 2 měsíci +10

    ThioJoe, I always like the way you share your thoughts on different topics about Security, PCs, and Preventing Scams! Keep up the good work!

  • @LA-MJ
    @LA-MJ Před 2 měsíci +41

    You can see the +x as a different color on cli so 😉

    • @KingJellyfishII
      @KingJellyfishII Před 2 měsíci +13

      also you'd never ./ a pdf file, you'd run `evince` (or whatever pdf reader you use) on it

    • @x-user3462
      @x-user3462 Před 2 měsíci

      @@KingJellyfishII or xdg-open path/to/pdf and this also didn't launch malware executable. IMHO only mc (or other curses file managers) users at risk if they try to open this fake PDF file by selecting it and hitting enter.

    • @aarond309
      @aarond309 Před 2 měsíci +4

      furthermore, while double clicking in a file manager may run it, xdg-open will never run the executable

    • @LA-MJ
      @LA-MJ Před 2 měsíci

      @@aarond309the run function normally requires a prompt or can be deactivated

    • @Handlebrake2
      @Handlebrake2 Před 2 měsíci +2

      ​@@KingJellyfishIIyou don't use Firefox?

  • @wildmanjeff42
    @wildmanjeff42 Před 2 měsíci +5

    Thanks for the information about scamio - probably the first advertisement that I can actually use.
    Really appreciate your channel and the time you spend teaching and keeping us informed !

    • @DccToon
      @DccToon Před 2 měsíci

      i agree, i used it and i identified some scams, would recommend

  • @edbp7689
    @edbp7689 Před 2 měsíci +13

    Personally, I would not have fallen for either.
    NPM, VS Code, GitHub and other similar repos are known to be vectors of malicious packages, even worse on NPM for a lot of typo-squatting packages.
    If I really had to install something like that, I would probably make into a disposable virtual machine with Clam-AV scanning after any install. (yes, sometimes paranoia pays off)
    The second one is a lot more obvious for some reasons:
    1. Many terminals, specially simpler ones are not UTF-8 (a.k.a. Unicode) piped, so listing the file would show up as file[?]pdf or file``~~pdf
    2. Even if it displays correctly the name, many terminal emulators would highlight the document in the executable colors, different from the regular documents (that are usally uncolored)
    3. As many other comments mention, file managers typically warn against executing files that are not generated by known compilers
    4. In many file managers, the thumbnail would be absent, wrong or use the thumbnail of the language of the file
    5. The options in "open with" would be devoid of any PDF reader

    • @mgord9518
      @mgord9518 Před 2 měsíci

      The only terminal I can think of off the top of my head that doesn't support unicode is xterm, which isn't very widely used

    • @dnchplay-archive
      @dnchplay-archive Před 2 měsíci +2

      6. People ususlly don't "./file.pdf", they usually do " file.pdf"

  • @Goku789
    @Goku789 Před 2 měsíci +3

    Thanks for another informative video, ThioJoe! Your clear explanations and engaging style make learning fun.
    Always appreciate your dedication to tackling complex topics in such an accessible way. Keep up the great work!

  • @MyCodingDiarie
    @MyCodingDiarie Před 2 měsíci +1

    Your videos always make my day. Keep shining!

  • @speedytruck
    @speedytruck Před 2 měsíci +17

    On Linux, most file managers don't actually use extensions to determine file type like on Windows. They use something called "magic bytes" which are present at the very beginning of a file and associates files to a particular program(s). So it should be obviouse that it wasn't a PDF file regardless of extension in good file managers.

    • @rossjennings4755
      @rossjennings4755 Před 2 měsíci +7

      Yeah, as a longtime Linux user, I was a bit confused that the hackers bothered to use a fake period to create a "file extension". Most of the time Linux doesn't care what the "file extension" is. On the other hand, I'm not so sure that common file managers would make it obvious that it's not a PDF. A sufficiently clever attacker could come up with various ways of making it look like a normal PDF at first glance.

    • @rossjennings4755
      @rossjennings4755 Před 2 měsíci +7

      Huh, I tried it with my own silly little executables and was surprised to find that, while Linux itself might not care, Dolphin actually cared rather a lot about the file extension. If the file ended in .pdf, it would give it a PDF icon and never try to execute it, instead trying to open it in a PDF viewer, regardless of the junk content. If it had no extension, it wouldn't get the PDF icon, but I would be prompted to confirm that I wanted to execute it. Learned something new today.

  • @lukchem
    @lukchem Před 2 měsíci +83

    Couldn’t the second one also work on Mac? Because the Mac has these Unix Executables which also don’t have a File Extension. Although these will probably immediately get terminated by the typical „Dude don’t download from Internet use App Store“ Window.

    • @WackoMcGoose
      @WackoMcGoose Před 2 měsíci +24

      Mark-of-the-Web is one of the few ideas Microsoft was genuinely _right_ about on a conceptual level, I think (as long as an option is provided to "run away, I know what I'm doing").

    • @mistershirokov5067
      @mistershirokov5067 Před 2 měsíci +30

      “Yes, I want to execute this picture, why the hell are you asking?..”
      >computer starts making noises
      “Must be rendering those pixels or something”

    • @null-nl5su
      @null-nl5su Před 2 měsíci +6

      Correction: that window is not about the App Store. It's about code signing. You can run anything that has a valid signature on a Mac by default.

    • @lukchem
      @lukchem Před 2 měsíci +3

      @@null-nl5su Yes I know that. My comment was supposed to be funny :)

    • @tablettablete186
      @tablettablete186 Před 2 měsíci +3

      MacOS Gatekeeper would have stopped the execution of the file if it wasn't signed (interesting name for a sec tool lol)

  • @45545videos
    @45545videos Před 2 měsíci +2

    As always, thank you for the proper subtitles!

  • @rphilipsgeekery4589
    @rphilipsgeekery4589 Před 2 měsíci +58

    Well that's first time I've rewinded to hear an ad ever I think

  • @shapelessed
    @shapelessed Před 2 měsíci +39

    The first thing you do when you clone an Node.js repo is install the dependencies, some devs simply won't check what the dependencies are and will install everything straight away, and for the ones who do check the top-level dependencies, the attacker company could create a completely legit package which in turn uses a dependency meant to do harm, ransom, theft and what not, making it harder to detect. The best part about NPM is that you don't even have to run the dependencies, there are plenty of ways for post-install scripts to be ran once you install your project dependencies.
    How do I know that? - I'm sorry for myself, but I'm a web dev.

    • @Coder_Tavi
      @Coder_Tavi Před 2 měsíci +6

      This issue makes me think about the whole *npm install everything* if anyone remembers that old issue.

    • @eric_d
      @eric_d Před 2 měsíci +1

      Or you can just realize that JS is the devil, and not use it. JS has been known for serious security holes ever since it was first created, and it's never gotten any better.

  • @_SJ
    @_SJ Před 2 měsíci +32

    ❤ This Scamio looks really cool

  • @LFCONTOP.
    @LFCONTOP. Před 2 měsíci +4

    Your videos are very helpful❤

  • @nikolayrogchev9628
    @nikolayrogchev9628 Před 2 měsíci

    Love your videos, keep up the good work, it is very helpful

  • @georgwrede7715
    @georgwrede7715 Před 2 měsíci

    Thio, you saved me the other week! I had just watched you talking about downloaded files having a password to uncompress them, and on Facebook I came across a cool AI system to download "for free". -- I almost fell for it.
    Thanx again, Thio!

  • @gydo1942
    @gydo1942 Před 2 měsíci +9

    As others pointed out, most file managers pop up a warning asking the user if they really want to run an executable. Also, I'd be suspicious of the file being in a zip as stated in the video, but also, PDF files always get an icon of a PDF file, or a preview of the actual document, whereas executables get another icon or just a general 'file' icon. I'd be suspicious of that immediately.
    I guess the advice is as always, be very very careful with what you download and run.. Whether it's files from a zip or libraries to use.

    • @lukkkasz323
      @lukkkasz323 Před 2 měsíci +1

      Can't the icon be changed? why would it be a generic icon?

    • @gydo1942
      @gydo1942 Před 2 měsíci

      @@lukkkasz323 On some systems you can change the icon, but you have to do it manually.
      The generic 'file' icon appears when the system doesn't recognize what kind of file it is. Executables often get a general 'file' icon or an icon clearly indicating it's executable. Not something like a PDF icon.

  • @brianbrino4310
    @brianbrino4310 Před 2 měsíci

    Thank you so much and I had these problems when I had a computer! I only use an IPhone now but I still enjoy watching your videos as many of the scams I understand apply to all computer based appliances!

  • @vladislavkaras491
    @vladislavkaras491 Před 2 měsíci +1

    Thanks for the video!

  • @Scat.original
    @Scat.original Před 15 dny

    Thank you for this Great Information.

  • @13thravenpurple94
    @13thravenpurple94 Před 2 měsíci

    Excellent video 👍 Thank you 💜

  • @singemfrc
    @singemfrc Před 2 měsíci +31

    That Linux exploit is pretty clever.

    • @shinobuoshino5066
      @shinobuoshino5066 Před 2 měsíci +4

      Yet only affects windows users who installed linux and tried best they could to make it work like windows.
      Anyone using GNU/Linux as intended, from the terminal would be told that file is corrupt if they tab, or not found if they wrote full filename with extension.
      There's 0 risk of them executing it as the way you open files in terminal is write out the program of choice that will open the file, and only then giving it the file to open... Also if you use ls beforehand to look at files anyone will immediately see that file is suspiciously marked as executable, pdf files also are distinct color on my system.
      And best part is that opening files from terminal is faster than fumbling through GUI with your mouse, so GUIdiots deserve anything coming their way.

    • @user255
      @user255 Před 2 měsíci +11

      @@shinobuoshino5066 So, how does CZcams look like in terminal?

    • @shinobuoshino5066
      @shinobuoshino5066 Před 2 měsíci +2

      @@user255 wintoddler grasping straws now, after I posted this comment on firefox... started from terminal.

    • @user255
      @user255 Před 2 měsíci +11

      @@shinobuoshino5066 Oh, I thought GUIs were only for GUIdiots.

    • @danielmc5693
      @danielmc5693 Před 2 měsíci

      @@shinobuoshino5066 If you're not using GET and POST while parsing through all the html with your mind you're not a real terminal truther.

  • @amogh_gurudatta
    @amogh_gurudatta Před 2 měsíci +3

    First time I completely saw a sponsered segment. Scamio sounds really useful if it works.

  • @Gunstick
    @Gunstick Před 2 měsíci +11

    Oh it only took 30 years for hackers to discover that you can put executable files on linux by using an archive.
    The no-extension trick works because linux does not check the extension to determine what to do with the file.
    So jpg files are opened with the picture viewer even when they have no extension.

    • @RowanHawkins
      @RowanHawkins Před 2 měsíci +3

      Yep its called magic number and is the first few bytes of the file.

  • @AroAce_Psychopath
    @AroAce_Psychopath Před 2 měsíci +13

    Now even the job applications must to be made in a VM. Can't have job in this world Orvus.
    Great video appreciate.

    • @shinobuoshino5066
      @shinobuoshino5066 Před 2 měsíci

      Or just create new user account, it's not that hard.

    • @RowanHawkins
      @RowanHawkins Před 2 měsíci +1

      Or don't run as a user with sudo privilege. Every time you make a 'convenience' decision that is lowering your security.

  • @ecavero1
    @ecavero1 Před 2 měsíci

    Fortunately, the last (and only) remote coding challenge was for a known company, and I didn't have to run anything but a Groovy script, which I read first. But the second scam got me thinking that I should be more careful on things I install on my system, specially if not from the package manager. Thanks for the awareness!

  • @ackava
    @ackava Před 2 měsíci

    Great video, we have reached a level where it is very difficult to stay vigilant, just like zip files, git repositories also retain +x attribute on files. And it can lead to similar issues.

  • @hellomiakoda3782
    @hellomiakoda3782 Před 2 měsíci +5

    This is why I stay familiar with what icons go with what filetype. If a PDF does not have the icon my system uses for PDFs, I will be very suspicious and investigate, ESPECIALLY if other, known ok PDFs have their icons!

    • @talibong9518
      @talibong9518 Před 2 měsíci +4

      Imagine being the only person that didn't get caught out in a large scale attack because you used a custom icon pack

    • @id01_01
      @id01_01 Před 2 měsíci +1

      I use XFCE and my icon pack makes PDF files pretty obvious. Also Thunar labels the file type when you single click a file

    • @shinobuoshino5066
      @shinobuoshino5066 Před 2 měsíci

      I use terminal so this by default would never work on me even if I wasn't paying attention.

  • @cedricbernard676
    @cedricbernard676 Před 2 měsíci

    Hi Joe, how are you doing? thanks for the quality of your videos. Was wondering if Bitdefender scamio is available for detecting fishing in French and Spanish.

  • @soulstenance
    @soulstenance Před 2 měsíci +6

    This is wild! I'm a Linux user, and although I'm pretty careful about where I download files from and who I trust, I can see how an unsuspecting or new Linux user could fall for this! I always say, the best antivirus is the user and his or her common sense! Be careful out there, no matter what system you're using!

    • @shinobuoshino5066
      @shinobuoshino5066 Před 2 měsíci

      GNU/Linux user who has any sense would use terminal to do everything, not some shitty Windows clone DE.

  • @ME0WMERE
    @ME0WMERE Před 2 měsíci +2

    As a linux user, the only reason why I wouldn't have falled for it is my setup - either I would try to open it from `vifm`, in which case it wouldn't have recognised the file and just opened it in a text editor, or I would have tried to open it from the terminal with `zathura`, in which case it would have complained about unrecognised file format.

  • @ckingpro
    @ckingpro Před 2 měsíci +4

    Believe it or not but some antiviruses can scan encrypted zip files. They do so by checking the CRC32 checksum of the file and its unpacked filesize. This prevents heuristic or more generalized patterns and the like, but simple signatures work.

  • @AnirudhTammireddy
    @AnirudhTammireddy Před 2 měsíci +5

    Best sponsor segment I've ever seen. Thanks bitdefender!

  • @willgallatin2802
    @willgallatin2802 Před 2 měsíci +4

    Linux has had the run as .exe option for a very long time. I'm amazed it has taken this long for some hacker to use it in such a way.

  • @s.daniel8016
    @s.daniel8016 Před 2 měsíci +1

    Thank you! ❤

  • @afjer
    @afjer Před 2 měsíci

    Thanks for letting us know. Usually coding challenges are done in a sandboxed online environment and don't require downloading anything, but I still might have fallen for it.

  • @yonatanyoffe6831
    @yonatanyoffe6831 Před 2 měsíci

    You are a life saver!

  • @skycaptain95
    @skycaptain95 Před 9 dny +1

    Oh no... that is astoundingly devious. I think I would have fallen for it.

  • @rustee_nyfe
    @rustee_nyfe Před 2 měsíci +1

    Wow. I think they'd easily get me with both tricks. I'm not a Linux user, but NPM... I'd love to learn more about that security policies that protected you

  • @LeoIsBehindYou
    @LeoIsBehindYou Před 2 měsíci +1

    just swapped to linux(lmde) and didn’t knew that! thanks a lot

  • @victorpetrescu13
    @victorpetrescu13 Před 2 měsíci

    I said that npm is wildlife everyday since like 5 years ago :D. Pretty sure most ppl already agreed with that but I am happy for any awareness spread on this.

  • @PascalBrax
    @PascalBrax Před 2 měsíci

    Wow this video did actually teach me something I didn't know, great content! I don't know if I'd fall for the fake extension file trick, because thanks to Windows, I'm very suspicious if a PDF or ZIP file doesn't show the right icon. 🤓

  • @Xudmud
    @Xudmud Před 2 měsíci

    Things like that second one are the reason I run more and more things through the 'file' command in a Linux shell, which reads (without executing) the beginning of the file to determine the filetype, usually based on the file's magic number.

  • @user-qr4jf4tv2x
    @user-qr4jf4tv2x Před 2 měsíci +2

    always do email access via windows hyper-v sandbox or sandbox in general,have separate emails for everything don't login at same time

  • @eriklundstedt9469
    @eriklundstedt9469 Před 2 měsíci +1

    The reason that Linux thing works is that "running a text-file" is something that you are expected to do
    My recommendation is to (in a terminal) run something like 'file sus.pdf'
    It will take a look at the file and tell you about its content (and file type)
    You can also do 'cat sus.pdf' but that might garble your terminal session if it's actually a pdf
    One alternative is to do 'head -1 sus.pdf ', which should just give you the first line
    Scripts usually start with '#!/usr/bin/bash' or something similar

  • @dudamoos
    @dudamoos Před 8 dny

    Even better is when actual companies use LLMs (AI) to create packages and the LLM hallucinates dependencies. There was a research study recently where the researchers created a bunch of packages that way and then (as a test) typo-squatted a few of the hallucinated dependencies. They actually found a few large tech companies accidentally using them. In one case, the hallucinated dependency was supposed to be another package by the same company!

  • @dawserdoos
    @dawserdoos Před měsícem

    One way to test for this, is force the OS to open the file you're suspicious of in a text editor. Most of these formats aren't compatible with just being "read" from a text editor, however these files will not only be plain "English," if you're savvy you can call out the bash script.
    For context, attempt to force a PDF or image into Notepad. Most files forced into notepad will look like gibberish and symbols. The malware here won't.

  • @chickkyy
    @chickkyy Před 2 měsíci +1

    Actually first noti - I think. already know it’s gonna be a bagner

  • @doityourself3293
    @doityourself3293 Před 2 měsíci

    Thanks - did not know that stuff.

  • @etmax1
    @etmax1 Před 2 měsíci

    I probably wouldn't fall for this, but you never know.
    Password protecting a zip is something I didn't know had that effect, but it does make sense and it now gives me an out to send files to work that don't get canned by the email protection there. previously I had to stuff around with a download service.

  • @daffy1981
    @daffy1981 Před 2 měsíci

    Thanks for the heads-up. I am a *nix user, and did not know that 😨

  • @denissorn
    @denissorn Před 2 měsíci

    btw one could also set -x on a directory level (E.g. tmp or where one downloads the files.) for all users, and AFAIK this would override the permissions on the file level.

  • @cancername
    @cancername Před 2 měsíci

    The second one is a mismatch between higher levels of abstraction (file manager automagically selecting the correct program) and lower levels of abstraction (file extensions don't exist and "executable" is a permission)

  • @louey2x
    @louey2x Před 2 měsíci +2

    I almost never use .zip in linux but thank you for this info. Never download anythng you don't already trust but always do it in a sandbox or isolated VM first .

  • @OzmandisMandis
    @OzmandisMandis Před 2 měsíci +2

    At least the linux one can't do that much harm since they're gonna get at most access to user space. Still plenty of room to do bad things but as long as you consider your user space to be unsafe (and you have taken measures around that) you could be fine. Protecting your user config such as your bashrc with root locks is a must to prevent this kind of attacks to work.

  • @PMX
    @PMX Před 2 měsíci

    On a Mac you will get a warning telling you something along the lines of "do you really want to execute this random application from an unidentified developer that you downloaded from the internet?" (or, by default, will tell you it can't run it because it's from an unidentified developer, although you can still run it if you want, just not with a simple double click). Even if they did register as developers and sign the application, you will still get a warning the first time because it's an application downloaded from the web, so you get a heads up.

  • @nuggetbugget9305
    @nuggetbugget9305 Před 2 měsíci +1

    As someone who always looks at packages that are being installed, checks file properties, and reviews source code before running anything I wouldn’t have fallen for this. When it is a binary file I will either open a hex editor or delete it without a second thought.

  • @lefteriseleftheriades7381
    @lefteriseleftheriades7381 Před 2 měsíci +1

    glad to see this channel go from lemon usb charger to something legit

  • @AnonZero0
    @AnonZero0 Před 2 měsíci +1

    *Thank you.*

  • @j3h8kkjd2a5
    @j3h8kkjd2a5 Před 2 měsíci +1

    as a somewhat familiar with the system linux user, i did not know archives would extract files with their meta + the exeuctable meta bit, so thats interesting to know

    • @x-user3462
      @x-user3462 Před 2 měsíci

      tar with some flags even can preserve xattrs attributes of file such as SELinux labels. It's often used for making full system backups.

  • @dragons_advocate
    @dragons_advocate Před 2 měsíci +2

    Not really a Linux specific thing, but I dislike file managers showing items not in a list with details -- that might allow you to catch something like that, too.

  • @bikeny
    @bikeny Před 2 měsíci +5

    This is making me long for my days in college using the keypunch machine to generate the lines of code for programs.

    • @phungyi4947
      @phungyi4947 Před 2 měsíci +1

      You can still do that if you wish. ;)

  • @eldrago19
    @eldrago19 Před 2 měsíci

    I wrote an article for my student newspaper about that issue with Linux execute permissions.
    Many of the UI/UX aspects of Linux's security undermine the whole system.

  • @camwha5904
    @camwha5904 Před 2 měsíci

    The npm example is why it’s best nowadays to do JavaScript projects in ether something like webcontainers (stackblitz) or just remote github workspaces (vscode server). That way you are never running random npm packages on your system unsandboxed.

  • @artursmihelsons415
    @artursmihelsons415 Před 2 měsíci

    Thanks for sharing!
    I'm a Linux user and never heard about zip hack, especially with unicode dot.. That's something new to be alerted and to warn my daughter too.
    Sometimes, I saw before single files compressed in Zip and, at preview, always wondering and thinking about reason for that, usually, before zip extraction.. 😂
    About executable, now I will check file properties before clicking..

    • @shinobuoshino5066
      @shinobuoshino5066 Před 2 měsíci +1

      Just learn how to use terminal and suddenly all these problems that target GUIdiots are completely nullified even if you aren't even aware of the fact that you're dealing with a malicious file.

  • @samareshxxx
    @samareshxxx Před 2 měsíci +7

    on linux the icon of pdf file and executable file are different. so user can easily identify that.

    • @kyokazuto
      @kyokazuto Před 2 měsíci +1

      true, on my system it would try to generate a preview for a pdf.

  • @TunifyBasic
    @TunifyBasic Před 10 dny

    in linux when you feel that your computer is doing something wrong just do sudo lsof -i you will get a list of connections pids and proc names then continue analysing in your way

  • @davidioanhedges
    @davidioanhedges Před 2 měsíci

    ZIP didn't used to preserve Linux file permissions ... because it didn't store them at all, now it does, but it's optional to preserve executable, but a lot of file managers turn this on by default .. !

  • @whoeverofhowevermany
    @whoeverofhowevermany Před 2 měsíci +2

    As the technological economy becomes harder to compete in, more genuinely skilled professionals will resort to things like scams, and so scams will start to become more skillful.

    • @asdfqwerty14587
      @asdfqwerty14587 Před 2 měsíci

      Well.. sort of, but not really. The main reason scams are (usually) so simplistic isn't that the scammers are really that dumb that they couldn't do anything better, but rather because it's just more lucrative to target idiots than it is to target tech savvy people. In the same amount of effort it takes to scam 1 tech savvy person you could've scammed dozens of idiots instead, so it's kind of just a waste of time making the scams more complicated like that - you can trick them of course, but not quickly enough for it to be economical for the scammer to focus on it unless you're doing a much more targeted attack where you're trying to target a specific person instead of just trying to scam anybody.

  • @alonsoherreros4945
    @alonsoherreros4945 Před 2 měsíci +1

    pdf documents, i usually drag-and-drop those into a browser tab to open them... but this could 100% fool me damn

  • @rjtimmerman2861
    @rjtimmerman2861 Před 2 měsíci

    This Scamio does really seem like a great tool

  • @raisincains337
    @raisincains337 Před 2 měsíci +1

    ngl that had to be the most enticing ad

  • @zxuiji
    @zxuiji Před 2 měsíci +3

    No, I did not know that execution protection is bypassed via archives. Realistically speaking archive extractors should really just remove the execution permission always. Sure it would be annoying to re-add those permissions for legitimate ones but that's still preferable to sneaky attacks getting though.

    • @cigmorfil4101
      @cigmorfil4101 Před 2 měsíci

      Not a completely good idea.
      If an archive includes subdirectories, then _always_ removing the exec bit will make the lower directories inaccessible - in a directory file the exec permission means you can search that directory for files when trying to read those files: you have to know what the files are called. The read bit on a directory allows you to list the contents of that directory (to see the names of the files in that directory).

    • @zxuiji
      @zxuiji Před 2 měsíci

      @@cigmorfil4101You realise I meant in the context of files right? Also the search and read should've been bundled into just one permission. There's no valid use case where you would want to be able to search for files you can't even read.

    • @shinobuoshino5066
      @shinobuoshino5066 Před 2 měsíci

      @@zxuiji directories are files, hope you realise that.

  • @Funny0facer
    @Funny0facer Před 2 měsíci

    about the linux issue: If you use a GUI, the mime-symbol for the file should make you aware of this. But if you just use the terminal or a list view without mime-type symbols, it's bad.

  • @AaronccGuo
    @AaronccGuo Před 2 měsíci +1

    yep, the linux trick will get me for sure... thx for sharing..

  • @Johncw87
    @Johncw87 Před 2 měsíci

    It's kind of surprising to me how many people in the comments used Linux and had no idea about archives preserving the execute bit. When I first started using Linux, I very quickly became aware of the execute bit. I later observed that I was able to run some executables that I extracted from an archive without first setting the execute bit. After investigating the archives, I found that the archive viewer showed the execute bit on the files in the archive, thus making it clear as day. I've even made use of this when I had a need to transfer executables from one Linux machine to another, and had to use some intermediary that didn't preserve the execute bits (like a FAT32 formatted flash drive, or Google Drive).

  • @gamereditor59ner22
    @gamereditor59ner22 Před 2 měsíci +11

    1:24 : Cool! Thank you!

  • @i.like.humans.
    @i.like.humans. Před 2 měsíci

    I knew that preflaged execution is prohibited in most Linux OS, but not that an .zip preserve that. I will definitely check my downloads from now on

  • @MsHojat
    @MsHojat Před 2 měsíci

    Do Linux file explorers typically have a "file type" column by default in detail view like Windows has? That is one way to catch this sort of thing. Granted these days so many people just instantly run stuff directly from the browser when it's done downloading (although I guess the zip file would still need to be opened and extracted), or even if they don't as a linux user they might just be doing some sort of CLI stuff that won't have them notice.

  • @aleckane99
    @aleckane99 Před 2 měsíci +12

    As a linux user, I will say that in my system I get a warning if something is going to execute. I am currently running a version of Arch.

    • @agooglygooglr
      @agooglygooglr Před 2 měsíci +3

      Same here. Running Fedora and the file manager (Nautilus) won't even run a script unless you right-click it.

    • @Meletion1
      @Meletion1 Před 2 měsíci +1

      “I use arch btw” - average arch user

    • @aleckane99
      @aleckane99 Před 2 měsíci +1

      @NB6G lmao so true usually but I only clarified so no one would be like "oh but what do you use" blah blah

  • @Midcon77
    @Midcon77 Před 2 měsíci

    Clever!

  • @AndSawMir
    @AndSawMir Před 2 měsíci

    For me the best way is using "noexec,nosuid,nodev" option on partition I am sure about I don't need to execute any application, like files downloaded from Internet, documentation, etc. And separate, "exec" partition symlinked to my home directory for compiled programs. And npm, well I don't use it, but it is like any package manager - you trust the source or not.

  • @randomguy400x
    @randomguy400x Před 2 měsíci +1

    That Linux one is quite smart, lots of different things packed into one. I totally would have fallen for this kind of stuff

  • @gblargg
    @gblargg Před 2 měsíci

    1:00 Great tool for scammers to run their schemes by until one isn't flagged a scam.

  • @aj_aka_alan
    @aj_aka_alan Před 2 měsíci +1

    As soon as I heard the part about scamio, I went over, created an account and the web site crashed. Server error.

  • @NoEgg4u
    @NoEgg4u Před 2 měsíci

    @4:20 -- That scam can be detected by way of doing a "ls" on the file, but with an "*".
    In the example filename that our host used @5:00 (file.pdf), do the following:
    $ ls *.pdf
    If the so-called "file.pdf" file does not get listed, then one of those characters is not what it appears to be.
    Since that dot character is not an actual dot character, it will not match the "*.pdf" pattern that you typed in.
    Also, if you grab any files from the internet (that includes unzipping files, as our host demonstrated), then do "ls -l" on all of the files (after they are unzipped). Check the permissions.
    If any of the files have the executable bit set, that is a big red flag.
    Also, it can't hurt to upload any files to virustotal, and see the results.

  • @alexmercer57
    @alexmercer57 Před 2 měsíci +1

    can you make a video about Kernel Power Failure Error - Event ID 41? There seems to be no way out from this, I tried a lot of things, but nothing is working out.

  • @anon_y_mousse
    @anon_y_mousse Před 2 měsíci

    Yep, I did indeed already know about that attack vector, which is why I almost never use the GUI file browser, but especially never as a means of opening files by double clicking them. Little known feature of `less` is that you can browse archives with it. So if an archive has a password, and it's supposed to be something official, that's a massive red flag. It might be useful for someone to extract archives into their own folder and just do `find . -type f -print0 | xargs -0 chmod -x` from the root of that folder.

  • @45545videos
    @45545videos Před 2 měsíci

    That first technique is pretty clever

  • @Lampe2020
    @Lampe2020 Před 2 měsíci +1

    At least in Cinnamon's file manager nemo (but also in nautilus, GNOME's file manager) double-clicking a file asks you i you want to run it with or without a terminal, or just open with another program and not run. So the 2nd technique wouldn't work on me because I keep that asking enabled.