183
submitted 11 months ago by kurumin@linux.community to c/linux@lemmy.ml
all 31 comments
sorted by: hot top controversial new old
[-] Retiring@lemmy.ml 71 points 11 months ago

If you run random .pdf.something-files pm‘d to you on LinkedIn you probably shouldn’t use a computer anyway, no matter if it runs Linux or Windows…

[-] OsrsNeedsF2P@lemmy.ml 32 points 11 months ago

Lazarus' Operation DreamJob, also known as Nukesped, is an ongoing operation targeting people who work in software or DeFi platforms with fake job offers on LinkedIn or other social media and communication platforms.

Looks like they're going after desperate job seeking crypto bros. Even if it's not terribly effective, it's a spray and pray, so they probably got some people.

[-] brick@lemm.ee 19 points 11 months ago

Seems to me like they are targeting people who likely have access to assets that can be easily stolen and hard to track.

[-] krimson@feddit.nl 32 points 11 months ago

Joke’s on them, I don’t use bash.

Seriously though, Linux will probably get targeted more frequently now that it is becoming more popular as a desktop OS.

[-] MonkderZweite@feddit.ch 15 points 11 months ago

But you probably have Bash? In this case, #!/bin/bash still runs it.

[-] krimson@feddit.nl 14 points 11 months ago

Yeah but according to the article it installs itself in .bash_profile.

[-] MonkderZweite@feddit.ch 10 points 11 months ago* (last edited 11 months ago)

Ok, you got me, i've only read the title.

Still good to make people aware of that, i think.

[-] krimson@feddit.nl 6 points 11 months ago

Absolutely.

[-] BCsven@lemmy.ca 31 points 11 months ago

So doesn't the user have to add +x to run this?

[-] leopold@lemmy.kde.social 29 points 11 months ago

It never occurred to me before reading this comment that there actually is a use case for the execute permission. To me it was always just this annoying thing I have to do whenever I download an executable which I didn't have to do on Windows.

[-] AProfessional@lemmy.world 11 points 11 months ago

Fun fact, Windows has the same permission it just defaults to enabled.

[-] Rustmilian@lemmy.world 27 points 11 months ago* (last edited 11 months ago)

No because the zip archive retains permissions of the contained files.

[-] LiveLM@lemmy.zip 35 points 11 months ago

Hm, maybe there should be an option to always disable the executable permission when extracting

[-] Rustmilian@lemmy.world 3 points 11 months ago

That's perhaps possible, but likely would have to be implemented in each achieving tools individually.

[-] BCsven@lemmy.ca 3 points 11 months ago
[-] MonkderZweite@feddit.ch 2 points 11 months ago* (last edited 11 months ago)

Zip too? I thought only on Windows, while tar retains unix permissions.

[-] Rustmilian@lemmy.world 2 points 11 months ago* (last edited 11 months ago)

All archive formats do it, afaik.

[-] MonkderZweite@feddit.ch 1 points 11 months ago

But i'm sure there was an issue somewhile ago, because zip only preserves Windows permissions...

[-] Rustmilian@lemmy.world 2 points 11 months ago* (last edited 11 months ago)

There's a bunch of zip implementations(Info-Zip, Gzip, 7-Zip, PKZip, Pigz, etc.), so perhaps an older version of one of the implementations didn't support preserving the Linux executable permission in the past.

[-] iAvicenna@lemmy.world 25 points 11 months ago

how someone working on software and tech opens a file called "HSBC job offer.pdf.zip" is beyond me...

[-] lars@lemmy.sdf.org 11 points 11 months ago

I’m not gonna lie. I want any job, no matter how fake, that uses a reddened North Korean “Hotel of Doom” in its literature.

[-] BlanK0@lemmy.ml 11 points 11 months ago* (last edited 11 months ago)

Still the exploit is easier to avoid compared to windows viruses and stuff. Even with the linux popularity increasing there is already out there good solutions to prevent this kinda stuff like have SELinux installed, use firejail to run suspicious files, use proxies to visit weird sites (you can use proxychains + tor, a bit overkill but works if you don't have a local proxy), etc.

Not to mention that one of the attack vectors of this exploit requires using a systemd feature which is the sysnetd which isnt going to work on other init systems. Reason why a lot of times minimalism can be superior to just having all the features + unnecessary ones out of the box.

[-] Fleppensteijn@feddit.nl 4 points 11 months ago

Wouldn't it show the icon of an executable file and ask if you want to open it or execute it?

this post was submitted on 21 Jan 2024
183 points (97.9% liked)

Linux

48721 readers
1098 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS