this post was submitted on 22 Nov 2023
65 points (100.0% liked)

Technology

37720 readers
478 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
top 5 comments
sorted by: hot top controversial new old
[–] redcalcium@lemmy.institute 43 points 1 year ago

the malware is written in the Visual Basic Scripting language

Linux users:

[–] Duke_Nukem_1990@feddit.de 16 points 1 year ago (1 children)

That sounds like an attack that should trigger article 5.

[–] SuiXi3D@kbin.social 19 points 1 year ago (1 children)

You'd think, but the geriatrics running our government barely know what a computer is, much less a virus.

[–] pbanj@lemmy.ml 8 points 1 year ago

God this gave me flashbacks to the google crap where they couldnt understand that google doesnt make the iphone.

[–] autotldr@lemmings.world 7 points 1 year ago

🤖 I'm a bot that provides automatic summaries for articles:

Click here to see the summaryA group of Russian-state hackers known for almost exclusively targeting Ukranian entities has branched out in recent months either accidentally or purposely by allowing USB-based espionage malware to infect a variety of organizations in other countries.

“Gamaredon continues to focus on [a] wide variety [of] Ukrainian targets, but due to the nature of the USB worm, we see indications of possible infection in various countries like USA, Vietnam, Chile, Poland and Germany,” Check Point researchers reported recently.

The image above, tracking submissions of LitterDrifter to the Alphabet-owned VirusTotal service, indicates that the Gamaredon malware may be infecting targets well outside the borders of Ukraine.

The data suggests that the number of infections in the US, Vietnam, Chile, Poland, and Germany combined may be roughly half of those hitting organizations inside Ukraine.

The core essence of the Spreader module lies in recursively accessing subfolders in each drive and creating LNK decoy shortcuts, alongside a hidden copy of the “trash.dll” file.

“Comprised of two primary components—-a spreading module and a C2 module—it’s clear that LitterDrifter was designed to support a large-scale collection operation,” Check Point researchers wrote.


Saved 75% of original text.