315
top 11 comments
sorted by: hot top controversial new old
[-] BlackEco@lemmy.blackeco.com 98 points 1 month ago

Earlier this year, researchers from security firm Avast spotted a newer FudModule variant that bypassed key Windows defenses such as Endpoint Detection and Response, and Protected Process Light. Microsoft took six months after Avast privately reported the vulnerability to fix it, a delay that allowed Lazarus to continue exploiting it.

Dammit Microsoft, you only had one job!

[-] flambonkscious@sh.itjust.works 49 points 1 month ago

I'll bet the NSA or others were using it and didn't want it broken, maybe

[-] Aceticon@lemmy.world 19 points 1 month ago* (last edited 1 month ago)

The NSA probably has the cryptographic keys (which they could easilly get with a FISA court order) for signing Microsoft Windows Updates, kernel drivers and so on, so I wouldn't be surprised if that is their main attack vector for Windows.

There are massive benefits for a State Surveillance and Electronic Espionage entity based in the country of the headquarters of the company that makes the OS and which has special Laws and special Surveillance Courts with secret court orders to let them get their hands directly on the data itself (if hosted on "the cloud") or the official digital keys for pushing whatever they want into computers running that OS.

Windows, iOS and MacOS should be treated by default as thoroughly compromised by the NSA, as should be any cloud hosting in the US or applications from companies based there.

This is not just an American thing: would you really trust a Russian OS or Chinese Data Hosting provider?

[-] jaybone@lemmy.world 6 points 1 month ago

What I don’t get is, we all know the NSA is doing this. It’s no big secret. Why don’t they just report the 0-day to Microsoft, so they can fix it, so that North Korea doesn’t also exploit it. In exchange, Microsoft can give them some special access or special keys or some backdoor. Why even bother pretending anymore or putting on this charade. It’s the same thing over and over again.

[-] candybrie@lemmy.world 9 points 1 month ago

In exchange, Microsoft can give them some special access or special keys or some backdoor.

They might be doing this. The thing is, putting something like that in makes so much more likely you'll accidentally create an exploit for other actors as well. It's why security experts are so against backdoors. They fundamentally compromise security.

[-] ladfrombrad@lemdro.id 1 points 1 month ago

Why even bother pretending anymore or putting on this charade. It’s the same thing over and over again.

If one puts an indeterminate amount of red tape around an object / thing / thought, does one become entangled in said red tape?

-- some idiot called lad from the internet's, circa last decade

[-] ravhall@discuss.online 13 points 1 month ago

Yet another reason to not use windows.

[-] tux0r@feddit.org 10 points 1 month ago

A Windows zero-day vulnerability recently patched by Microsoft was exploited by hackers working on behalf of the North Korean government so they could install custom malware that’s exceptionally stealthy and advanced, researchers reported Monday.

I am always amazed at how easy it is for ‘security researchers’ to speculate about which government is solely responsible for exploiting security vulnerabilities.

[-] einkorn@feddit.org 45 points 1 month ago

Specific groups of hackers often have various markers that appear throughout their various malware.

Reused code fragments are the most obvious one. Others are specific code styles such as variable naming, even formatting. It's basically the same stuff that is used to determine whether a specific text was most likely written by a specific person.

[-] booly@sh.itjust.works 12 points 1 month ago

During World War II, the telegraph interception guys would figure out which enemy units were where, even without having broken the codes, because each telegraph operators each had their own "fist," or distinct patterns in how they punched in the Morse code, and people listening to the signals day in and day out could learn to distinguish them even when dealing entirely in encrypted text.

In modern times, attribution of hacker groups include other indicators include what time zones certain people seem to be active in, what their targets are (and aren't), hints about installed language support or keyboard layouts or preferred punctuation or localized representations of numbers. For example, you can tell here on Lemmy when someone uses different types of quotation marks a decent indication of what country that person might be from, even in a totally English language thread.

[-] Kecessa@sh.itjust.works 10 points 1 month ago

For more on that, go listen to Darknet Diaries, episodes where they talk about major hacks are great

this post was submitted on 20 Aug 2024
315 points (99.1% liked)

Technology

58735 readers
5258 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS