this post was submitted on 25 Jul 2024
161 points (100.0% liked)

Cybersecurity

5687 readers
62 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] borari@lemmy.dbzer0.com 3 points 3 months ago* (last edited 3 months ago)

If it got to the point you were being investigated/prosecuted and you used a computer you didn’t properly dispose of afterwards, yes. They’ll take a forensic image of the system and trawl through it to find any artifacts left by your participation.

If you went and downloaded LOIC manually, you probably didn’t get compromised.

If a suss encoded powershell command loads and executes some dll in memory from the internet, which then runs some dechained process that’s sending the ddos traffic you probably got compromised.

Just like anything, you could make your intentional participation look like a compromise. You could also just buy a laptop with cash on fb marketplace, go to McDonald’s or Starbucks or some shit, get on their public WiFi, then just stash the laptop under a booth or something.

Side note, does anyone know if anyone wound up getting prosecuted for their participation in LOIC campaigns?