The Malware So Tricky Even Programmers Fall For It

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 พ.ค. 2024
  • Sponsored: Discover the new Bitdefender Scamio (Free, easy-to-use AI chatbot for detecting and preventing scams): www.bitdefender.com/solutions...
    ▼ Time Stamps: ▼
    0:00 - Intro
    0:27 - What Are Hackers Doing This Time?
    0:45 - A Very Good Thing
    2:07 - The Hacker's 1st Technique
    4:20 - The 2nd Technique
    6:32 - Some General Tips
    ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
    • My Gear & Equipment ⇨ kit.co/ThioJoe
    • Merch ⇨ teespring.com/stores/thiojoe
    • My Desktop Wallpapers ⇨ thiojoe.art/
    ⇨ / thiojoe
    ⇨ / thiojoe
    ⇨ / thiojoetv
    ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 666

  • @GeekIWG
    @GeekIWG 3 หลายเดือนก่อน +1055

    Of note on modern Linux desktops (at least in Gnome and KDE), file managers will ask before executing files by default, so remember to keep that option enabled!

    • @AlfiesFuntime
      @AlfiesFuntime 3 หลายเดือนก่อน +51

      Maybe newer versions of GNOME/Plasma should make it more clear because some people just click ok on popups
      It is already quite clear but if people are doing this it means it works, which isn't good.

    • @GeekIWG
      @GeekIWG 3 หลายเดือนก่อน +24

      @@AlfiesFuntime Isn't that the truth. Also wish KDE would get rid of that "Don't ask me again" checkbox.

    • @felixjohnson3874
      @felixjohnson3874 3 หลายเดือนก่อน +55

      One issue is the KDE dialog has a rather stupid "don't ask again" checkbox. Sounds reasonable right? Yeah, no. "Don't ask again" means "never ask me how I want to run an executable ever again" not "don't ask me about running this executable again". Clicking that checkbox once permanently turns off that security measure completely unless you specifically reenable it, after which you need to deal with the pop up everytime you want to run any executable directly, even if you trust it.

    • @felixjohnson3874
      @felixjohnson3874 3 หลายเดือนก่อน +15

      ​​​​@@AlfiesFuntimenope. Its purpose is to clarify the action that will be taken, not protect people from themselves. If you don't read the warnings thats your problem. Its there to tell/ask you whether to run the executable, not protect you from yourself if you don't read warnings.
      Fool-proof is one thing, but Linus-proofing is a futile effort that just makes the UX worse for no reason. Linus proved pretty plainly that if you're willing to ignore one warning you're willing to ignore 5 more.

    • @felixjohnson3874
      @felixjohnson3874 3 หลายเดือนก่อน +36

      ​@@GeekIWGthey can keep the checkbox, they just need to make it file-specific. If a user wants to turn it off completely put that setting somewhere else, but the pop-up checkbox should be "Don't ask me again for this file" because as it currently is it's unacceptably ambiguous.

  • @cindrmon
    @cindrmon 3 หลายเดือนก่อน +824

    new fear unlocked: unicode period pretending to be a file extension separator

    • @WindowsDaily
      @WindowsDaily 3 หลายเดือนก่อน +54

      on windows, no extension would say what do you want to do with this file with no extention, notepad, paint? so we're probably safe, jut linux users to worry about.

    • @cindrmon
      @cindrmon 3 หลายเดือนก่อน +43

      @@WindowsDaily but.. i am a linux user...

    • @x-user3462
      @x-user3462 3 หลายเดือนก่อน

      Just use bind mount with noexec option for you downloads directory.
      $ cat /etc/fstab | tail -n1
      /home/x-user/downloads /home/x-user/downloads none bind,noexec,nofail,x-systemd.device-timeout=2 0 0

    • @vnc.t
      @vnc.t 3 หลายเดือนก่อน +46

      ​@@cindrmonmost file managers have a setting to show a "do you want to run this file" popup when doubleclicking executables

    • @shallex5744
      @shallex5744 3 หลายเดือนก่อน +2

      @@cindrmon what would that do? file names don't mean anything, so that wouldn't change the functionality of the file, would it?

  • @LordZordid
    @LordZordid 3 หลายเดือนก่อน +364

    30 years experience in IT and I can honestly say that I might have fallen for it.

    • @typingcat
      @typingcat 3 หลายเดือนก่อน

      I would have checked the file with VirusTotal, even if it actually had ".pdf" extension, because PDF files can contain viruses, and I don't trust any e-mail attachment, even if it came from a legitimate source, because that person could not know that his PC is infected.

    • @CoreDump451
      @CoreDump451 2 หลายเดือนก่อน +22

      Yup, especially the first one.
      I think it says a lot about our industry practices (using npm without care).

    • @williamdrum9899
      @williamdrum9899 2 หลายเดือนก่อน

      Especially how unicode has devolved into a diarrhea of gotchas. Namely, by allowing it to mix with ASCII

  • @DiamondSaberYT
    @DiamondSaberYT 3 หลายเดือนก่อน +230

    Plot twist: the job application is for a cybersecurity position, and their challenge is to not fall for the less obvious hacks

    • @sayven
      @sayven 2 หลายเดือนก่อน +8

      Nice idea but obviously it would still be illegal

    • @__christopher__
      @__christopher__ 2 หลายเดือนก่อน +30

      @@sayvenMaybe the cybersecurity position is actually hiring black-hat hackers. So the first test does double-duty: If you detect the problem, you get to the next round. If you don't, they still profit from you.

    • @abdirahmann
      @abdirahmann 2 หลายเดือนก่อน +13

      @@__christopher__ This is mad clever fr

    • @cryptoafc7655
      @cryptoafc7655 2 หลายเดือนก่อน

      bruh mind blowing

  • @madcow3417
    @madcow3417 3 หลายเดือนก่อน +323

    4:09 That malicious package has 285k downloads. I probably would have trusted it too... Although the description starts with 'A' instead of 'An', so maybe not so much.
    That pdf executable is really smart.

    • @Combineboy
      @Combineboy 3 หลายเดือนก่อน

      So people who make a grammar mistake are automatically people giving you a virus?

    • @_denzy_6310
      @_denzy_6310 2 หลายเดือนก่อน +2

      I wouldn't even trust a download counter. I'll have to run the file through file command

    • @lastyhopper2792
      @lastyhopper2792 2 หลายเดือนก่อน +1

      The download counter is a trophy for the hacker who made that tactic.

  • @xanzut
    @xanzut 3 หลายเดือนก่อน +78

    The malicious NPM is really scary, you will get hacked even before run the code. There's a something called "preinstall script" in NPM which is will be executed when downloading the package. This is known technique for attack called "Dependency Confusion"

    • @ilsavv
      @ilsavv 3 หลายเดือนก่อน +3

      This is terrible and hopeless!

    • @markusklyver6277
      @markusklyver6277 2 หลายเดือนก่อน +1

      I don't think the preinstall script runs the code though.

    • @xanzut
      @xanzut 2 หลายเดือนก่อน

      @@markusklyver6277 there's a lot of article explaining about Dependency Confusion, read and understand it

  • @rphilipsgeekery4589
    @rphilipsgeekery4589 3 หลายเดือนก่อน +265

    It's scary they are targeting software Devs they could infect thier releases

    • @soulstenance
      @soulstenance 3 หลายเดือนก่อน +34

      Another good reason to sign your commits and software packages!

    • @dingokidneys
      @dingokidneys 3 หลายเดือนก่อน +24

      Possibly hunting for access to a good supply chain, e.g. Solarwinds or Linux kernel contributors.

    • @FlooferLand
      @FlooferLand 3 หลายเดือนก่อน +9

      @@dingokidneys luckily the kernel is safe since everything has to pass through Linus before getting merged

    • @dingokidneys
      @dingokidneys 3 หลายเดือนก่อน +15

      @@FlooferLand I have great faith in the kernel development team and of course Linus, but if bad actors keep nibbling at the edges there's a possibility that something nefarious could creep in, if not all at once, in little bits over time. Nation State actors play the long game so we have to be on our toes at all times.
      The fact that some binary BLOBS of proprietary software are accepted in drivers, like the official nVidia driver, means that if someone can get into the nVidia driver team, they could possibly sneak something effectively into the kernel without review by the kernel team. This is why Stallman and Debian (previously) were so adamant about keeping proprietary software, especially that where the source was not open, out of the ecosystem.

    • @boulderbash19700209
      @boulderbash19700209 2 หลายเดือนก่อน +1

      Not just them. Any "company" may ask you to download some form for their rebate or promotion.

  • @lint2023
    @lint2023 3 หลายเดือนก่อน +62

    I had a scam from a "recruiter" once where they wanted me to set up an account with them and they required a password to be my last four SS number. That flagged me and they held firm after I called them out on it. I also held firm. It was a major known corp that I wanted to work for, but I still believe it was a scammer working through the resume sites.

    • @edwardmacnab354
      @edwardmacnab354 3 หลายเดือนก่อน +6

      some places like Capital One ask you to enter your SS # but it is optional

    • @eric_d
      @eric_d 2 หลายเดือนก่อน

      @@edwardmacnab354It's ALWAYS optional to use your SS# for anything that doesn't directly deal with your employment or personal taxes. Even banks can't require your SS#, even though most of their employees have been trained to tell you that the patriot act requires them to get it from you. It's actually illegal, in most cases, for them to even ask for it. I ran into a situation several years back when I was given a corporate debit card so I could withdraw money to pay for vehicles. Wells Fargo gave me a huge issue over refusing to give them my SS# for a few weeks, but after consulting with their legal department, they told me that I was 100% correct about everything that I told them, and they gave me the card. Even if it had been an interest bearing account, it would not have directly, or even indirectly, been related to MY taxes. The only impact on taxes would have been on the company I worked for. I had an AMEX card, and cards from BoA, Wells Fargo, and TD bank, all with my name and the company name on them, and I never gave any of them my SS#, because you're NEVER supposed to give that to anyone except your employer and whoever is doing your taxes.

  • @dontmindme8709
    @dontmindme8709 3 หลายเดือนก่อน +28

    Malware targeting Linux users? Wow, the year of the Linux desktop is truly upon us!
    Though seriously, thanks for spreading the word on these scams! This could easily fool anyone

    • @notNajimi
      @notNajimi หลายเดือนก่อน +1

      That’s unironically very encouraging in regards to the future of Linux in the home. Adoption of Linux is getting high enough for attackers to target end-users and not just servers

    • @SpyrosFilippopoulos
      @SpyrosFilippopoulos 11 วันที่ผ่านมา +1

      I fear the day i have to use an antivirus on linux

  • @yuu-kun3461
    @yuu-kun3461 3 หลายเดือนก่อน +63

    A new linux thing was a fake Exodus snap package, which asked people to input their 12-words phrase to import wallet. Then of course, the crypto got stolen.

    • @LordZordid
      @LordZordid 3 หลายเดือนก่อน

      The money was spent on a diamond encrusted gold toilet for Kim Jong Un. It's very lavish but awfully painful to sit on. Being a dictator has it's costs.

    • @shinobuoshino5066
      @shinobuoshino5066 2 หลายเดือนก่อน +2

      as if anyone needed more reasons to avoid flatshit, snapshit and other kinds of shit

    • @fluf201playz
      @fluf201playz 2 หลายเดือนก่อน +2

      @@shinobuoshino5066 holy shit

    • @orngjce223
      @orngjce223 2 หลายเดือนก่อน

      ​@@shinobuoshino5066 If you don't like Flatpak or Snap, that's fine. And Snap has closed-source elements, which is also perfectly reasonable to dislike. But the original intention behind Flatpak is that it is on average more secure because the installer never has to leave userspace.

  • @edbp7689
    @edbp7689 3 หลายเดือนก่อน +14

    Personally, I would not have fallen for either.
    NPM, VS Code, GitHub and other similar repos are known to be vectors of malicious packages, even worse on NPM for a lot of typo-squatting packages.
    If I really had to install something like that, I would probably make into a disposable virtual machine with Clam-AV scanning after any install. (yes, sometimes paranoia pays off)
    The second one is a lot more obvious for some reasons:
    1. Many terminals, specially simpler ones are not UTF-8 (a.k.a. Unicode) piped, so listing the file would show up as file[?]pdf or file``~~pdf
    2. Even if it displays correctly the name, many terminal emulators would highlight the document in the executable colors, different from the regular documents (that are usally uncolored)
    3. As many other comments mention, file managers typically warn against executing files that are not generated by known compilers
    4. In many file managers, the thumbnail would be absent, wrong or use the thumbnail of the language of the file
    5. The options in "open with" would be devoid of any PDF reader

    • @mgord9518
      @mgord9518 3 หลายเดือนก่อน +1

      The only terminal I can think of off the top of my head that doesn't support unicode is xterm, which isn't very widely used

    • @dnchplay-archive
      @dnchplay-archive 2 หลายเดือนก่อน +3

      6. People ususlly don't "./file.pdf", they usually do " file.pdf"

  • @LA-MJ
    @LA-MJ 3 หลายเดือนก่อน +42

    You can see the +x as a different color on cli so 😉

    • @KingJellyfishII
      @KingJellyfishII 3 หลายเดือนก่อน +13

      also you'd never ./ a pdf file, you'd run `evince` (or whatever pdf reader you use) on it

    • @x-user3462
      @x-user3462 3 หลายเดือนก่อน

      @@KingJellyfishII or xdg-open path/to/pdf and this also didn't launch malware executable. IMHO only mc (or other curses file managers) users at risk if they try to open this fake PDF file by selecting it and hitting enter.

    • @aarond309
      @aarond309 3 หลายเดือนก่อน +4

      furthermore, while double clicking in a file manager may run it, xdg-open will never run the executable

    • @LA-MJ
      @LA-MJ 3 หลายเดือนก่อน

      @@aarond309the run function normally requires a prompt or can be deactivated

    • @Handlebrake2
      @Handlebrake2 2 หลายเดือนก่อน +2

      ​@@KingJellyfishIIyou don't use Firefox?

  • @speedytruck
    @speedytruck 2 หลายเดือนก่อน +18

    On Linux, most file managers don't actually use extensions to determine file type like on Windows. They use something called "magic bytes" which are present at the very beginning of a file and associates files to a particular program(s). So it should be obviouse that it wasn't a PDF file regardless of extension in good file managers.

    • @rossjennings4755
      @rossjennings4755 2 หลายเดือนก่อน +8

      Yeah, as a longtime Linux user, I was a bit confused that the hackers bothered to use a fake period to create a "file extension". Most of the time Linux doesn't care what the "file extension" is. On the other hand, I'm not so sure that common file managers would make it obvious that it's not a PDF. A sufficiently clever attacker could come up with various ways of making it look like a normal PDF at first glance.

    • @rossjennings4755
      @rossjennings4755 2 หลายเดือนก่อน +8

      Huh, I tried it with my own silly little executables and was surprised to find that, while Linux itself might not care, Dolphin actually cared rather a lot about the file extension. If the file ended in .pdf, it would give it a PDF icon and never try to execute it, instead trying to open it in a PDF viewer, regardless of the junk content. If it had no extension, it wouldn't get the PDF icon, but I would be prompted to confirm that I wanted to execute it. Learned something new today.

  • @vpun215
    @vpun215 3 หลายเดือนก่อน +89

    as a programmer, i can confirm that i would 110% fall for this malware.

    • @dvorakgigachad1444
      @dvorakgigachad1444 2 หลายเดือนก่อน +4

      first one, probably.. second one, very unlikely

    • @vpun215
      @vpun215 2 หลายเดือนก่อน

      @@dvorakgigachad1444 ma mans a giga

    • @Azertyyys
      @Azertyyys 2 หลายเดือนก่อน +3

      Printing hello world doesnt make you a programmer

  • @4WheelerinMiami
    @4WheelerinMiami 3 หลายเดือนก่อน +11

    ThioJoe, I always like the way you share your thoughts on different topics about Security, PCs, and Preventing Scams! Keep up the good work!

  • @rphilipsgeekery4589
    @rphilipsgeekery4589 3 หลายเดือนก่อน +58

    Well that's first time I've rewinded to hear an ad ever I think

  • @wildmanjeff42
    @wildmanjeff42 3 หลายเดือนก่อน +6

    Thanks for the information about scamio - probably the first advertisement that I can actually use.
    Really appreciate your channel and the time you spend teaching and keeping us informed !

    • @DccToon
      @DccToon 2 หลายเดือนก่อน

      i agree, i used it and i identified some scams, would recommend

  • @shapelessed
    @shapelessed 3 หลายเดือนก่อน +39

    The first thing you do when you clone an Node.js repo is install the dependencies, some devs simply won't check what the dependencies are and will install everything straight away, and for the ones who do check the top-level dependencies, the attacker company could create a completely legit package which in turn uses a dependency meant to do harm, ransom, theft and what not, making it harder to detect. The best part about NPM is that you don't even have to run the dependencies, there are plenty of ways for post-install scripts to be ran once you install your project dependencies.
    How do I know that? - I'm sorry for myself, but I'm a web dev.

    • @Coder_Tavi
      @Coder_Tavi 3 หลายเดือนก่อน +6

      This issue makes me think about the whole *npm install everything* if anyone remembers that old issue.

    • @eric_d
      @eric_d 2 หลายเดือนก่อน +1

      Or you can just realize that JS is the devil, and not use it. JS has been known for serious security holes ever since it was first created, and it's never gotten any better.

  • @lukchem
    @lukchem 3 หลายเดือนก่อน +84

    Couldn’t the second one also work on Mac? Because the Mac has these Unix Executables which also don’t have a File Extension. Although these will probably immediately get terminated by the typical „Dude don’t download from Internet use App Store“ Window.

    • @WackoMcGoose
      @WackoMcGoose 3 หลายเดือนก่อน +24

      Mark-of-the-Web is one of the few ideas Microsoft was genuinely _right_ about on a conceptual level, I think (as long as an option is provided to "run away, I know what I'm doing").

    • @mistershirokov5067
      @mistershirokov5067 3 หลายเดือนก่อน +30

      “Yes, I want to execute this picture, why the hell are you asking?..”
      >computer starts making noises
      “Must be rendering those pixels or something”

    • @null-nl5su
      @null-nl5su 3 หลายเดือนก่อน +6

      Correction: that window is not about the App Store. It's about code signing. You can run anything that has a valid signature on a Mac by default.

    • @lukchem
      @lukchem 3 หลายเดือนก่อน +3

      @@null-nl5su Yes I know that. My comment was supposed to be funny :)

    • @tablettablete186
      @tablettablete186 2 หลายเดือนก่อน +3

      MacOS Gatekeeper would have stopped the execution of the file if it wasn't signed (interesting name for a sec tool lol)

  • @Goku789
    @Goku789 3 หลายเดือนก่อน +3

    Thanks for another informative video, ThioJoe! Your clear explanations and engaging style make learning fun.
    Always appreciate your dedication to tackling complex topics in such an accessible way. Keep up the great work!

  • @singemfrc
    @singemfrc 3 หลายเดือนก่อน +31

    That Linux exploit is pretty clever.

    • @shinobuoshino5066
      @shinobuoshino5066 2 หลายเดือนก่อน +4

      Yet only affects windows users who installed linux and tried best they could to make it work like windows.
      Anyone using GNU/Linux as intended, from the terminal would be told that file is corrupt if they tab, or not found if they wrote full filename with extension.
      There's 0 risk of them executing it as the way you open files in terminal is write out the program of choice that will open the file, and only then giving it the file to open... Also if you use ls beforehand to look at files anyone will immediately see that file is suspiciously marked as executable, pdf files also are distinct color on my system.
      And best part is that opening files from terminal is faster than fumbling through GUI with your mouse, so GUIdiots deserve anything coming their way.

    • @user255
      @user255 2 หลายเดือนก่อน +11

      @@shinobuoshino5066 So, how does TH-cam look like in terminal?

    • @shinobuoshino5066
      @shinobuoshino5066 2 หลายเดือนก่อน +2

      @@user255 wintoddler grasping straws now, after I posted this comment on firefox... started from terminal.

    • @user255
      @user255 2 หลายเดือนก่อน +11

      @@shinobuoshino5066 Oh, I thought GUIs were only for GUIdiots.

    • @danielmc5693
      @danielmc5693 2 หลายเดือนก่อน

      @@shinobuoshino5066 If you're not using GET and POST while parsing through all the html with your mind you're not a real terminal truther.

  • @quad5
    @quad5 5 วันที่ผ่านมา +1

    I'm so proud of myself that I figured out that hackers can put files in zip folder to be left with executable property enabled before you said that in the video :)

  • @MyCodingDiarie
    @MyCodingDiarie 3 หลายเดือนก่อน +1

    Your videos always make my day. Keep shining!

  • @gydo1942
    @gydo1942 3 หลายเดือนก่อน +9

    As others pointed out, most file managers pop up a warning asking the user if they really want to run an executable. Also, I'd be suspicious of the file being in a zip as stated in the video, but also, PDF files always get an icon of a PDF file, or a preview of the actual document, whereas executables get another icon or just a general 'file' icon. I'd be suspicious of that immediately.
    I guess the advice is as always, be very very careful with what you download and run.. Whether it's files from a zip or libraries to use.

    • @lukkkasz323
      @lukkkasz323 2 หลายเดือนก่อน +1

      Can't the icon be changed? why would it be a generic icon?

    • @gydo1942
      @gydo1942 2 หลายเดือนก่อน

      @@lukkkasz323 On some systems you can change the icon, but you have to do it manually.
      The generic 'file' icon appears when the system doesn't recognize what kind of file it is. Executables often get a general 'file' icon or an icon clearly indicating it's executable. Not something like a PDF icon.

  • @AroAce_Psychopath
    @AroAce_Psychopath 3 หลายเดือนก่อน +13

    Now even the job applications must to be made in a VM. Can't have job in this world Orvus.
    Great video appreciate.

    • @shinobuoshino5066
      @shinobuoshino5066 2 หลายเดือนก่อน

      Or just create new user account, it's not that hard.

    • @RowanHawkins
      @RowanHawkins 2 หลายเดือนก่อน +1

      Or don't run as a user with sudo privilege. Every time you make a 'convenience' decision that is lowering your security.

  • @Gunstick
    @Gunstick 3 หลายเดือนก่อน +11

    Oh it only took 30 years for hackers to discover that you can put executable files on linux by using an archive.
    The no-extension trick works because linux does not check the extension to determine what to do with the file.
    So jpg files are opened with the picture viewer even when they have no extension.

    • @RowanHawkins
      @RowanHawkins 2 หลายเดือนก่อน +3

      Yep its called magic number and is the first few bytes of the file.

  • @hellomiakoda3782
    @hellomiakoda3782 3 หลายเดือนก่อน +5

    This is why I stay familiar with what icons go with what filetype. If a PDF does not have the icon my system uses for PDFs, I will be very suspicious and investigate, ESPECIALLY if other, known ok PDFs have their icons!

    • @talibong9518
      @talibong9518 2 หลายเดือนก่อน +4

      Imagine being the only person that didn't get caught out in a large scale attack because you used a custom icon pack

    • @id01_01
      @id01_01 2 หลายเดือนก่อน +1

      I use XFCE and my icon pack makes PDF files pretty obvious. Also Thunar labels the file type when you single click a file

    • @shinobuoshino5066
      @shinobuoshino5066 2 หลายเดือนก่อน

      I use terminal so this by default would never work on me even if I wasn't paying attention.

  • @45545videos
    @45545videos 2 หลายเดือนก่อน +2

    As always, thank you for the proper subtitles!

  • @nikolayrogchev9628
    @nikolayrogchev9628 2 หลายเดือนก่อน

    Love your videos, keep up the good work, it is very helpful

  • @georgwrede7715
    @georgwrede7715 2 หลายเดือนก่อน

    Thio, you saved me the other week! I had just watched you talking about downloaded files having a password to uncompress them, and on Facebook I came across a cool AI system to download "for free". -- I almost fell for it.
    Thanx again, Thio!

  • @vladislavkaras491
    @vladislavkaras491 3 หลายเดือนก่อน +1

    Thanks for the video!

  • @willgallatin2802
    @willgallatin2802 3 หลายเดือนก่อน +4

    Linux has had the run as .exe option for a very long time. I'm amazed it has taken this long for some hacker to use it in such a way.

  • @brianbrino4310
    @brianbrino4310 3 หลายเดือนก่อน

    Thank you so much and I had these problems when I had a computer! I only use an IPhone now but I still enjoy watching your videos as many of the scams I understand apply to all computer based appliances!

  • @Scat.original
    @Scat.original 23 วันที่ผ่านมา

    Thank you for this Great Information.

  • @LFCONTOP.
    @LFCONTOP. 3 หลายเดือนก่อน +4

    Your videos are very helpful❤

  • @amogh_gurudatta
    @amogh_gurudatta 3 หลายเดือนก่อน +3

    First time I completely saw a sponsered segment. Scamio sounds really useful if it works.

  • @13thravenpurple94
    @13thravenpurple94 3 หลายเดือนก่อน

    Excellent video 👍 Thank you 💜

  • @_SJ
    @_SJ 3 หลายเดือนก่อน +32

    ❤ This Scamio looks really cool

  • @soulstenance
    @soulstenance 3 หลายเดือนก่อน +6

    This is wild! I'm a Linux user, and although I'm pretty careful about where I download files from and who I trust, I can see how an unsuspecting or new Linux user could fall for this! I always say, the best antivirus is the user and his or her common sense! Be careful out there, no matter what system you're using!

    • @shinobuoshino5066
      @shinobuoshino5066 2 หลายเดือนก่อน

      GNU/Linux user who has any sense would use terminal to do everything, not some shitty Windows clone DE.

  • @ME0WMERE
    @ME0WMERE 2 หลายเดือนก่อน +2

    As a linux user, the only reason why I wouldn't have falled for it is my setup - either I would try to open it from `vifm`, in which case it wouldn't have recognised the file and just opened it in a text editor, or I would have tried to open it from the terminal with `zathura`, in which case it would have complained about unrecognised file format.

  • @ecavero1
    @ecavero1 2 หลายเดือนก่อน

    Fortunately, the last (and only) remote coding challenge was for a known company, and I didn't have to run anything but a Groovy script, which I read first. But the second scam got me thinking that I should be more careful on things I install on my system, specially if not from the package manager. Thanks for the awareness!

  • @rafal_czerwinski
    @rafal_czerwinski 3 หลายเดือนก่อน +23

    I was always very sceptical about allowing unicode in filesystems, and now the reality confirms it.

  • @skycaptain95
    @skycaptain95 17 วันที่ผ่านมา +1

    Oh no... that is astoundingly devious. I think I would have fallen for it.

  • @ackava
    @ackava 2 หลายเดือนก่อน

    Great video, we have reached a level where it is very difficult to stay vigilant, just like zip files, git repositories also retain +x attribute on files. And it can lead to similar issues.

  • @afjer
    @afjer 2 หลายเดือนก่อน

    Thanks for letting us know. Usually coding challenges are done in a sandboxed online environment and don't require downloading anything, but I still might have fallen for it.

  • @samareshxxx
    @samareshxxx 3 หลายเดือนก่อน +7

    on linux the icon of pdf file and executable file are different. so user can easily identify that.

    • @kyokazuto
      @kyokazuto 2 หลายเดือนก่อน +1

      true, on my system it would try to generate a preview for a pdf.

  • @s.daniel8016
    @s.daniel8016 3 หลายเดือนก่อน +1

    Thank you! ❤

  • @ckingpro
    @ckingpro 3 หลายเดือนก่อน +4

    Believe it or not but some antiviruses can scan encrypted zip files. They do so by checking the CRC32 checksum of the file and its unpacked filesize. This prevents heuristic or more generalized patterns and the like, but simple signatures work.

  • @cedricbernard676
    @cedricbernard676 2 หลายเดือนก่อน

    Hi Joe, how are you doing? thanks for the quality of your videos. Was wondering if Bitdefender scamio is available for detecting fishing in French and Spanish.

  • @yonatanyoffe6831
    @yonatanyoffe6831 3 หลายเดือนก่อน

    You are a life saver!

  • @aleckane99
    @aleckane99 3 หลายเดือนก่อน +12

    As a linux user, I will say that in my system I get a warning if something is going to execute. I am currently running a version of Arch.

    • @agooglygooglr
      @agooglygooglr 3 หลายเดือนก่อน +3

      Same here. Running Fedora and the file manager (Nautilus) won't even run a script unless you right-click it.

    • @Meletion1
      @Meletion1 3 หลายเดือนก่อน +1

      “I use arch btw” - average arch user

    • @aleckane99
      @aleckane99 3 หลายเดือนก่อน +1

      @NB6G lmao so true usually but I only clarified so no one would be like "oh but what do you use" blah blah

  • @PascalBrax
    @PascalBrax 2 หลายเดือนก่อน

    Wow this video did actually teach me something I didn't know, great content! I don't know if I'd fall for the fake extension file trick, because thanks to Windows, I'm very suspicious if a PDF or ZIP file doesn't show the right icon. 🤓

  • @victorpetrescu13
    @victorpetrescu13 2 หลายเดือนก่อน

    I said that npm is wildlife everyday since like 5 years ago :D. Pretty sure most ppl already agreed with that but I am happy for any awareness spread on this.

  • @doityourself3293
    @doityourself3293 3 หลายเดือนก่อน

    Thanks - did not know that stuff.

  • @rustee_nyfe
    @rustee_nyfe 3 หลายเดือนก่อน +1

    Wow. I think they'd easily get me with both tricks. I'm not a Linux user, but NPM... I'd love to learn more about that security policies that protected you

  • @nuggetbugget9305
    @nuggetbugget9305 2 หลายเดือนก่อน +1

    As someone who always looks at packages that are being installed, checks file properties, and reviews source code before running anything I wouldn’t have fallen for this. When it is a binary file I will either open a hex editor or delete it without a second thought.

  • @LeoIsBehindYou
    @LeoIsBehindYou 2 หลายเดือนก่อน +1

    just swapped to linux(lmde) and didn’t knew that! thanks a lot

  • @OzmandisMandis
    @OzmandisMandis 2 หลายเดือนก่อน +2

    At least the linux one can't do that much harm since they're gonna get at most access to user space. Still plenty of room to do bad things but as long as you consider your user space to be unsafe (and you have taken measures around that) you could be fine. Protecting your user config such as your bashrc with root locks is a must to prevent this kind of attacks to work.

  • @eriklundstedt9469
    @eriklundstedt9469 2 หลายเดือนก่อน +1

    The reason that Linux thing works is that "running a text-file" is something that you are expected to do
    My recommendation is to (in a terminal) run something like 'file sus.pdf'
    It will take a look at the file and tell you about its content (and file type)
    You can also do 'cat sus.pdf' but that might garble your terminal session if it's actually a pdf
    One alternative is to do 'head -1 sus.pdf ', which should just give you the first line
    Scripts usually start with '#!/usr/bin/bash' or something similar

  • @bikeny
    @bikeny 3 หลายเดือนก่อน +5

    This is making me long for my days in college using the keypunch machine to generate the lines of code for programs.

    • @phungyi4947
      @phungyi4947 2 หลายเดือนก่อน +1

      You can still do that if you wish. ;)

  • @lefteriseleftheriades7381
    @lefteriseleftheriades7381 3 หลายเดือนก่อน +1

    glad to see this channel go from lemon usb charger to something legit

  • @dudamoos
    @dudamoos 17 วันที่ผ่านมา

    Even better is when actual companies use LLMs (AI) to create packages and the LLM hallucinates dependencies. There was a research study recently where the researchers created a bunch of packages that way and then (as a test) typo-squatted a few of the hallucinated dependencies. They actually found a few large tech companies accidentally using them. In one case, the hallucinated dependency was supposed to be another package by the same company!

  • @AnonZero0
    @AnonZero0 3 หลายเดือนก่อน +1

    *Thank you.*

  • @whoeverofhowevermany
    @whoeverofhowevermany 3 หลายเดือนก่อน +2

    As the technological economy becomes harder to compete in, more genuinely skilled professionals will resort to things like scams, and so scams will start to become more skillful.

    • @asdfqwerty14587
      @asdfqwerty14587 2 หลายเดือนก่อน

      Well.. sort of, but not really. The main reason scams are (usually) so simplistic isn't that the scammers are really that dumb that they couldn't do anything better, but rather because it's just more lucrative to target idiots than it is to target tech savvy people. In the same amount of effort it takes to scam 1 tech savvy person you could've scammed dozens of idiots instead, so it's kind of just a waste of time making the scams more complicated like that - you can trick them of course, but not quickly enough for it to be economical for the scammer to focus on it unless you're doing a much more targeted attack where you're trying to target a specific person instead of just trying to scam anybody.

  • @gblargg
    @gblargg 2 หลายเดือนก่อน

    1:00 Great tool for scammers to run their schemes by until one isn't flagged a scam.

  • @dragons_advocate
    @dragons_advocate 3 หลายเดือนก่อน +2

    Not really a Linux specific thing, but I dislike file managers showing items not in a list with details -- that might allow you to catch something like that, too.

  • @artursmihelsons415
    @artursmihelsons415 2 หลายเดือนก่อน

    Thanks for sharing!
    I'm a Linux user and never heard about zip hack, especially with unicode dot.. That's something new to be alerted and to warn my daughter too.
    Sometimes, I saw before single files compressed in Zip and, at preview, always wondering and thinking about reason for that, usually, before zip extraction.. 😂
    About executable, now I will check file properties before clicking..

    • @shinobuoshino5066
      @shinobuoshino5066 2 หลายเดือนก่อน +1

      Just learn how to use terminal and suddenly all these problems that target GUIdiots are completely nullified even if you aren't even aware of the fact that you're dealing with a malicious file.

  • @Ironyum99
    @Ironyum99 3 หลายเดือนก่อน +122

    Thiojoe isn’t pregnant (yet) but he always delivers!😂

    • @anthgodz
      @anthgodz 3 หลายเดือนก่อน +20

      I look in the top comment and see this

    • @celiskurtis
      @celiskurtis 3 หลายเดือนก่อน +9

      Stop it.

    • @d9zirable
      @d9zirable 3 หลายเดือนก่อน +12

      worst comment of the year

    • @kingpanguan
      @kingpanguan 3 หลายเดือนก่อน +6

      Yet

    • @kenkaeloriondo5676
      @kenkaeloriondo5676 3 หลายเดือนก่อน +3

      Best comment of the year*

  • @daffy1981
    @daffy1981 2 หลายเดือนก่อน

    Thanks for the heads-up. I am a *nix user, and did not know that 😨

  • @louey2x
    @louey2x 3 หลายเดือนก่อน +2

    I almost never use .zip in linux but thank you for this info. Never download anythng you don't already trust but always do it in a sandbox or isolated VM first .

  • @alonsoherreros4945
    @alonsoherreros4945 2 หลายเดือนก่อน +1

    pdf documents, i usually drag-and-drop those into a browser tab to open them... but this could 100% fool me damn

  • @zxuiji
    @zxuiji 3 หลายเดือนก่อน +3

    No, I did not know that execution protection is bypassed via archives. Realistically speaking archive extractors should really just remove the execution permission always. Sure it would be annoying to re-add those permissions for legitimate ones but that's still preferable to sneaky attacks getting though.

    • @cigmorfil4101
      @cigmorfil4101 2 หลายเดือนก่อน

      Not a completely good idea.
      If an archive includes subdirectories, then _always_ removing the exec bit will make the lower directories inaccessible - in a directory file the exec permission means you can search that directory for files when trying to read those files: you have to know what the files are called. The read bit on a directory allows you to list the contents of that directory (to see the names of the files in that directory).

    • @zxuiji
      @zxuiji 2 หลายเดือนก่อน

      @@cigmorfil4101You realise I meant in the context of files right? Also the search and read should've been bundled into just one permission. There's no valid use case where you would want to be able to search for files you can't even read.

    • @shinobuoshino5066
      @shinobuoshino5066 2 หลายเดือนก่อน

      @@zxuiji directories are files, hope you realise that.

  • @dawserdoos
    @dawserdoos 2 หลายเดือนก่อน

    One way to test for this, is force the OS to open the file you're suspicious of in a text editor. Most of these formats aren't compatible with just being "read" from a text editor, however these files will not only be plain "English," if you're savvy you can call out the bash script.
    For context, attempt to force a PDF or image into Notepad. Most files forced into notepad will look like gibberish and symbols. The malware here won't.

  • @AnirudhTammireddy
    @AnirudhTammireddy 3 หลายเดือนก่อน +5

    Best sponsor segment I've ever seen. Thanks bitdefender!

  • @user-qr4jf4tv2x
    @user-qr4jf4tv2x 3 หลายเดือนก่อน +2

    always do email access via windows hyper-v sandbox or sandbox in general,have separate emails for everything don't login at same time

  • @chickkyy
    @chickkyy 3 หลายเดือนก่อน +1

    Actually first noti - I think. already know it’s gonna be a bagner

  • @raisincains337
    @raisincains337 3 หลายเดือนก่อน +1

    ngl that had to be the most enticing ad

  • @Xudmud
    @Xudmud 2 หลายเดือนก่อน

    Things like that second one are the reason I run more and more things through the 'file' command in a Linux shell, which reads (without executing) the beginning of the file to determine the filetype, usually based on the file's magic number.

  • @MsHojat
    @MsHojat 2 หลายเดือนก่อน

    Do Linux file explorers typically have a "file type" column by default in detail view like Windows has? That is one way to catch this sort of thing. Granted these days so many people just instantly run stuff directly from the browser when it's done downloading (although I guess the zip file would still need to be opened and extracted), or even if they don't as a linux user they might just be doing some sort of CLI stuff that won't have them notice.

  • @rjtimmerman2861
    @rjtimmerman2861 2 หลายเดือนก่อน

    This Scamio does really seem like a great tool

  • @j3h8kkjd2a5
    @j3h8kkjd2a5 3 หลายเดือนก่อน +1

    as a somewhat familiar with the system linux user, i did not know archives would extract files with their meta + the exeuctable meta bit, so thats interesting to know

    • @x-user3462
      @x-user3462 3 หลายเดือนก่อน

      tar with some flags even can preserve xattrs attributes of file such as SELinux labels. It's often used for making full system backups.

  • @grampi68
    @grampi68 3 หลายเดือนก่อน +3

    Jon, Now you got me worried. I consider myself to be a tech savvy person. If even people like you can get hacked somehow, then just what chance do I have to avoid getting hit?

    • @ilsavv
      @ilsavv 3 หลายเดือนก่อน

      Not a chance. Relax.

    • @shinobuoshino5066
      @shinobuoshino5066 2 หลายเดือนก่อน

      If you were tech savvy you'd use terminal and know not to type ./pdffile.pdf

  • @__christopher__
    @__christopher__ 2 หลายเดือนก่อน +2

    I open PDFs from the command line, thus I would not have fallen for the fake PDF. I would just have gotten an error message that this is not a valid PDF file. Command line FTW!

    • @shinobuoshino5066
      @shinobuoshino5066 2 หลายเดือนก่อน +1

      Commandline will never be obsoleted.

  • @45545videos
    @45545videos 2 หลายเดือนก่อน

    That first technique is pretty clever

  • @etmax1
    @etmax1 2 หลายเดือนก่อน

    I probably wouldn't fall for this, but you never know.
    Password protecting a zip is something I didn't know had that effect, but it does make sense and it now gives me an out to send files to work that don't get canned by the email protection there. previously I had to stuff around with a download service.

  • @alexmercer57
    @alexmercer57 3 หลายเดือนก่อน +1

    can you make a video about Kernel Power Failure Error - Event ID 41? There seems to be no way out from this, I tried a lot of things, but nothing is working out.

  • @SouravTechLabs
    @SouravTechLabs 2 หลายเดือนก่อน +5

    I'm a software developer, and I exclusively use Linux - no Windows for me. I thought I was immune to falling for any of those scams, but after watching this video, I've realized I need to take things more seriously. I'm aware of how these tricks work, including executables hidden in archives, but I never considered it from this perspective before. Specifically, from the perspective of scammers who lure software devs by proposing job opportunities with better salaries!

  • @camwha5904
    @camwha5904 3 หลายเดือนก่อน

    The npm example is why it’s best nowadays to do JavaScript projects in ether something like webcontainers (stackblitz) or just remote github workspaces (vscode server). That way you are never running random npm packages on your system unsandboxed.

  • @randomguy400x
    @randomguy400x 3 หลายเดือนก่อน +1

    That Linux one is quite smart, lots of different things packed into one. I totally would have fallen for this kind of stuff

  • @denissorn
    @denissorn 2 หลายเดือนก่อน

    btw one could also set -x on a directory level (E.g. tmp or where one downloads the files.) for all users, and AFAIK this would override the permissions on the file level.

  • @miguelhernandez72
    @miguelhernandez72 2 หลายเดือนก่อน

    Well now I'll be paranoid of any take home assignments

  • @gayesthusky2177
    @gayesthusky2177 2 หลายเดือนก่อน +11

    I love getting scams because it means I can prank call the scammers and have hours of free entertainment. Hearing the scammers rage and curse before being forced to shut down their scam is its own reward.

    • @mattbergman2788
      @mattbergman2788 2 หลายเดือนก่อน

      EW.

    • @user-hr8rc1of3x
      @user-hr8rc1of3x 2 หลายเดือนก่อน

      @@mattbergman2788 ?

    • @wedoalittletrolling723
      @wedoalittletrolling723 2 หลายเดือนก่อน +2

      @@mattbergman2788 are you a scammer yourself? cuz why you saying "EW" to that?

  • @m96fa40
    @m96fa40 2 หลายเดือนก่อน

    IDK about Unix Systems (MacOS/Linux) but on Windows when you change the file extension it asks you "are you sure?", so it would be that simple if you want to make sure of the file's extension

  • @PMX
    @PMX 2 หลายเดือนก่อน

    On a Mac you will get a warning telling you something along the lines of "do you really want to execute this random application from an unidentified developer that you downloaded from the internet?" (or, by default, will tell you it can't run it because it's from an unidentified developer, although you can still run it if you want, just not with a simple double click). Even if they did register as developers and sign the application, you will still get a warning the first time because it's an application downloaded from the web, so you get a heads up.

  • @aj_aka_alan
    @aj_aka_alan 3 หลายเดือนก่อน +1

    As soon as I heard the part about scamio, I went over, created an account and the web site crashed. Server error.

  • @gamereditor59ner22
    @gamereditor59ner22 3 หลายเดือนก่อน +11

    1:24 : Cool! Thank you!

  • @DominikJaniec
    @DominikJaniec 2 หลายเดือนก่อน

    Interesting!

  • @EugeneFox
    @EugeneFox 3 หลายเดือนก่อน

    Luckily, I'm safe for now, thanks to VS Code's dev containers, docker and other virtualization things I use for development. Btw, cool stuff, really handy

  • @Midcon77
    @Midcon77 3 หลายเดือนก่อน

    Clever!

  • @hipposgrumm
    @hipposgrumm 2 หลายเดือนก่อน

    I remember being able to remove the file extension of a video file on Raspbian and it still ran as a movie.

    • @icantcomeupwithnames469
      @icantcomeupwithnames469 2 หลายเดือนก่อน

      Yes, a well-written program won't assume what a file is from its extension or lack thereof.