They keep trying to backdoor Open Source

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 ธ.ค. 2024

ความคิดเห็น •

  • @kiraaaaaa
    @kiraaaaaa หลายเดือนก่อน +2134

    Adding an obvious eval of obfuscated code as the only code change in a PR claiming to be a documentation update kind of feels genuinely _less stealthy_ than just adding the malicious code unobfuscated, lying about what it does, and hoping no one reads it though

    • @deltamico
      @deltamico หลายเดือนก่อน +174

      Encoding a code like this doesn't ever have a legit usecase right? its only to bypass the automated checks

    • @paxcoder
      @paxcoder หลายเดือนก่อน +87

      Yeah, that was dumb. Maybe it's a(n unethical) researcher testing to see how easy it might be to compromise software

    • @ThePsycho211
      @ThePsycho211 หลายเดือนก่อน

      @@deltamico It tries to exploit human error, that you wont notice. Yeah, sure its hard to miss but shit happens. Obviously it wont pass any human that notices it and has 2 brain cells working to check wtf is this even doing.

    • @undefinedchannel9916
      @undefinedchannel9916 หลายเดือนก่อน +86

      @@paxcoderatp there’s no difference between a “researcher” and “attacker”

    • @paxcoder
      @paxcoder หลายเดือนก่อน +49

      ​@@undefinedchannel9916 I'm not quite sure what you're trying to say. There should be a difference between a black hat hacker and someone who does research.

  • @God-i2
    @God-i2 หลายเดือนก่อน +2386

    People doing these are the malware of Mankind

    • @uhohwhy
      @uhohwhy หลายเดือนก่อน +13

      they most likely will live a happy life :D

    • @zakyia
      @zakyia หลายเดือนก่อน +126

      ​@@uhohwhy Not if I can help it!

    • @uhohwhy
      @uhohwhy หลายเดือนก่อน +10

      @@zakyia keep dreamin

    • @turkym7md5
      @turkym7md5 หลายเดือนก่อน +39

      @@uhohwhy nah buddy, there's something called karma, god will take from you as much as you took from people

    • @totallymonke
      @totallymonke หลายเดือนก่อน +18

      @@turkym7md5 thats a myth

  • @MrPyro91
    @MrPyro91 หลายเดือนก่อน +1300

    scriptkiddie level of "stealth"

    • @__Brandon__
      @__Brandon__ หลายเดือนก่อน +43

      Unfortunately that's still sophisticated enough to rekt people

    • @ouss
      @ouss หลายเดือนก่อน +43

      I read skibidi

    • @iennefaLsh
      @iennefaLsh หลายเดือนก่อน +14

      ​@@ouss skiddie toulet

    • @SoularHeart01
      @SoularHeart01 หลายเดือนก่อน

      ​@@ouss You're not too far off. It's the same level of brainrott scriptkiddies have

    • @jamesp1389
      @jamesp1389 หลายเดือนก่อน +16

      ​@@ouss skididi kiddie

  • @Sypaka
    @Sypaka หลายเดือนก่อน +1431

    1990's virus: hello
    2024's virus: i am gonna hide in your files, decode myself, download another one, decode that one too and then DOWNLOAD another one.

    • @eadweard.
      @eadweard. หลายเดือนก่อน +86

      90s viruses tended to be a lot more sophisticated imo.

    • @Sypaka
      @Sypaka หลายเดือนก่อน +214

      @@eadweard. Like "I am hiding in your MBR and wait for 30 boots or until 12th December to run the payload."

    • @su-25frogfoot74
      @su-25frogfoot74 หลายเดือนก่อน +88

      @@eadweard. 90's malware compared to today's malware is SUPER basic.

    • @eadweard.
      @eadweard. หลายเดือนก่อน +63

      @@Sypaka That sort of thing, plus self-modifying code, ploymorphic encryption, remaining resident in atypical locations like video memory. They had to spread using a few bytes and no Internet access.

    • @eadweard.
      @eadweard. หลายเดือนก่อน +17

      @@su-25frogfoot74 Other way around I'm afraid.

  • @UnNamedGuy0
    @UnNamedGuy0 หลายเดือนก่อน +587

    Why do people try this method anyway? Obfuscated code is the biggest red flag of all. It would be detected immediately. Especially in large/popular repos where maintainers check commits for malicious code before accepting.

    • @soccerguy2433
      @soccerguy2433 หลายเดือนก่อน +128

      cause they only need 1 slip up

    • @macchiato_1881
      @macchiato_1881 หลายเดือนก่อน +11

      Does github have a flagger to users who submit obfuscated code to huge public repositories?

    • @lolwutizit
      @lolwutizit หลายเดือนก่อน +128

      Reminder that the XZ backdoor was only caught because some dude noticed SSH takes 0.5 seconds longer than it used to, not because it was caught in code review

    • @rudzik8164
      @rudzik8164 หลายเดือนก่อน +101

      @@lolwutizit reminder that Jia Tan wasn't as stupid as the people trying to insert these. he didn't just put execute an obfuscated string made in a for loop from a character array
      it was a combination of binary test files (which is fine and expected for a compression utility, but the ones Jia Tan added were never used in any actual tests, see cf44e4b in the xz repo) and a configuration script to insert the backdoor into distributed tarballs
      that isn't to say that the code is safe just based on how safe the diff looks; it's just that the people doing these python backdoors are idiots targeting idiots. unless the maintainer suffers a stroke in the middle of code review, this would never pass

    • @cdarklock
      @cdarklock หลายเดือนก่อน +1

      @@soccerguy2433 This. Once you let them get on the other side of the airtight hatch, they can wreak all kinds of havoc.

  • @Ahmed_AEK
    @Ahmed_AEK หลายเดือนก่อน +191

    "until automated scanning gets better", this is a worse issue, when people start trusting automated scanning. attackers just need to bypass that, as people will be less likely to review code and automated scanning won't be able to catch "new" attacks, there MUST be HUMANS reviewing code.

    • @0LoneTech
      @0LoneTech หลายเดือนก่อน +4

      And where the scanning is automated, you can automate the bypass search.

    • @Templarfreak
      @Templarfreak หลายเดือนก่อน +4

      @@0LoneTech but then it'd be a centralized battle between those writing the code for the automated search and those writing the malicious code themselves, as opposed to right now where those writing the malicious code are effectively automated and centralized currently already, attacking tons of people who may not know they are being attacked and have to manually review if they are being attacked

    • @Templarfreak
      @Templarfreak หลายเดือนก่อน +5

      also: it's another hoop they do have to jump through to do their malicious activities, which would probably help get rid of a good chunk of these extremely simple and obvious attacks because it'd be too much effort for them (idk if you couldnt already tell, but they are extremely lazy lol)

    • @temp50
      @temp50 29 วันที่ผ่านมา +1

      I mean automated scans are the bare minimum. Lot of devs are not even doing that one!

    • @Person01234
      @Person01234 6 วันที่ผ่านมา

      Yes if people get lazy and start relying on automation then open source loses the main thing it has going for it security wise over proprietary. They can be a component but they shouldn't be the only thing we do.

  • @taukakao
    @taukakao หลายเดือนก่อน +377

    I mean if he would have hidden this in a huge PR then it might have slipped through but this is just lazy.

    • @temp50
      @temp50 29 วันที่ผ่านมา

      "might have slipped through"? I really do hope that you are kidding. What are the static code analyzers made for, if not to filter the problematic parts like these _before_ compilation / transpilation?
      Devs are fckn lazy these day.

    • @AfonsodelCB
      @AfonsodelCB 29 วันที่ผ่านมา +5

      ​@@temp50 what code base are you actively managing?

    • @taukakao
      @taukakao 29 วันที่ผ่านมา +9

      @@temp50
      I'm really not kidding. Most small projects don't use code analyzers.
      Some projects might take security more serious than others but I don't believe that slipping in a payload would be particularly difficult in smaller projects.
      "Devs are fckn lazy these day." is also an insane take.

    • @fisch37
      @fisch37 28 วันที่ผ่านมา +1

      Honestly I felt insulted by how obvious of a payload that was

  • @SanekGamer007
    @SanekGamer007 หลายเดือนก่อน +327

    5:07 i saw the command "termux-setup-storage" which only exists in android terminal emulator named termux and grants the storage permission
    so the payload asks for storage permission, then proceeds to just wipe half the phone
    cool!

    • @Sharpless2
      @Sharpless2 หลายเดือนก่อน +42

      that command is used to give Termux access to storage. Running this command for no reason will NOT wipe your phone. It will wipe ONLY whats set as your ~/storage. If you are dumb enough to set your root (/sdcard or /storage/emulated/0) as storage in Termux, it COULD wipe your stuff, except it wouldnt due to missing privileges.

    • @SanekGamer007
      @SanekGamer007 หลายเดือนก่อน +15

      @Sharpless2 i said 'that script' not 'that command'
      bad word pick ig

    • @ferecece
      @ferecece หลายเดือนก่อน +1

      @@Sharpless2 also considering android updates, it is even worse regarding privileges?

    • @EDDY-to2hf
      @EDDY-to2hf หลายเดือนก่อน +1

      i smell andriod malware upon seeing the termux-setup-storage line of code

    • @mattymerr701
      @mattymerr701 หลายเดือนก่อน +5

      ​@@SanekGamer007 no, the word choice was fine. The commenter just has bad reading comprehension

  • @ahmadmusaahf
    @ahmadmusaahf หลายเดือนก่อน +43

    3:39 gagal means fail in Indonesian / Malay

  • @KvapuJanjalia
    @KvapuJanjalia หลายเดือนก่อน +184

    Nowhere nearly as sophisticated as Jia Tan. This is script-kiddie level.

    • @_zeeblo
      @_zeeblo หลายเดือนก่อน +2

      I love your profile picture lmao

    • @sid6645
      @sid6645 หลายเดือนก่อน +16

      Jia Tan was hardcore. Definitely some S tier black hat hired by god knows who.

    • @bountyjedi
      @bountyjedi หลายเดือนก่อน +7

      I'd expect better of even script kiddies tbh...
      This one is hilariously obvious. There's only two lines added too, so it's not like it's even able to be missed on review.
      Using exec in python is also basically a no-no to begin with, even for non-malicious code. I'd bet your run-of-the-mill linter would catch it for that reason alone.

    • @mgord9518
      @mgord9518 หลายเดือนก่อน +5

      ​@@bountyjedi"I'd expect better of even script kiddies"
      You shouldn't. Commonly they're literal children (like middle school age) whose training consists of nothing but a couple TH-cam videos like "HOW TO HACK WITH KALI LINUX -- REAL TUTORIAL"

    • @turtlefrog369
      @turtlefrog369 หลายเดือนก่อน

      @@sid6645 Jia Tan is aggent77. in other words CIA Man.

  • @syrus3k
    @syrus3k หลายเดือนก่อน +41

    How it actually happens is that the package maintainer is threatened in real life and forced to merge something. That's it. No normal people would merge this crap

  • @ghostdunk
    @ghostdunk หลายเดือนก่อน +65

    this is like the A=1 B=2 cipher of attempting malicious code. did a 13 year old do this

    • @chrissametrinequartz9389
      @chrissametrinequartz9389 หลายเดือนก่อน +2

      most likely

    • @TomJakobW
      @TomJakobW หลายเดือนก่อน +3

      An AC y/o did this, for sure! 😁

    • @galoomba5559
      @galoomba5559 29 วันที่ผ่านมา +1

      Not "like", that's literally what it is (except the numbers are different)

  • @emmanuelknight8974
    @emmanuelknight8974 หลายเดือนก่อน +531

    me watching this who casually downloads hundreds of random projects from github without reading the code 💀

    • @buntizz
      @buntizz หลายเดือนก่อน +15

      same lol

    • @brawldude2656
      @brawldude2656 หลายเดือนก่อน +88

      most of them are safe since owners wont merge these prs

    • @Pepo..
      @Pepo.. หลายเดือนก่อน +11

      omg just read this while installing 5 github projects through winget 😭

    • @MichaelDeHaven
      @MichaelDeHaven หลายเดือนก่อน +41

      ​@@Pepo..Hehe, interesting timing. But this is an old problem. Our civilization long ago passed the point any single person could vet our tech/knowledge. Like it or not, we rely on overlapping networks of trust.

    • @fontenbleau
      @fontenbleau หลายเดือนก่อน +3

      Tell that to Pinokio Ai launcher which was very problematic to run in Windows because it always triggers safeguards, until current version. That thing automatically installs github projects by script at fast speed. It delivers the promises but i would recommend to turn off PC physically from any Internet.

  • @HikaruAkitsuki
    @HikaruAkitsuki หลายเดือนก่อน +31

    Pushing an obfuscated code as random array is red flag enough.

  • @MuzikBike
    @MuzikBike หลายเดือนก่อน +250

    this youtube channel appeared in a dream i had and i don't know why

    • @Nirioonossian
      @Nirioonossian หลายเดือนก่อน +57

      There can be no doubt. You are the chosen one.

    • @slop_core
      @slop_core หลายเดือนก่อน +4

      Maybe you've seen it before and forgot about it

    • @pixelcatcher123
      @pixelcatcher123 หลายเดือนก่อน +12

      u might got hacked in another timeline and that is the echo from u warning u

    • @onrch
      @onrch หลายเดือนก่อน

      ​@@pixelcatcher123His brain got hacked

    • @distorted_heavy
      @distorted_heavy หลายเดือนก่อน +1

      Fated to be

  • @pajeetsingh
    @pajeetsingh หลายเดือนก่อน +86

    Good work. Here's another thing to look at.
    One youtube ad while running librewolf Mozilla Firefox 130.0-3 spawned a "RDD" process.
    Apparently, it is related to "distributed media" or something like that but it seems people are talking about hackers exploiting it to run crypto mines. When RDD was spawned it took 50% of CPU load. Killing librewolf removed the RDD process.

    • @Fiufsciak
      @Fiufsciak หลายเดือนก่อน +46

      It's a marvel ad providers are still not held accountable for stuff like that, and yet they'd like to control what you say.

    • @NorthernChimp
      @NorthernChimp หลายเดือนก่อน

      You mean an ad from googleadservices? So TH-cam processes uploaded videos to standardize the format and scans their content, but Google Ads serves us random files just as they come?

    • @GPT-4_Beta
      @GPT-4_Beta หลายเดือนก่อน +11

      @@Fiufsciak TH-cam is actually doing a lot to protect it's customers... no, not us, we are "Users", the Advertisers, they bring in the money.

    • @turtlefrog369
      @turtlefrog369 หลายเดือนก่อน

      it only affected librewolf?

    • @pajeetsingh
      @pajeetsingh หลายเดือนก่อน

      @@turtlefrog369 Well, when I searched the issue, the results were talking about Mozilla Firefox; but I experienced that in librewold which is a fork of Firefox.

  • @2fgee
    @2fgee หลายเดือนก่อน +22

    5:37 i think "facebook hack" is like they send this to ppl on facebook or using a zeroday to run it or something like that

  • @LastNameOptional-s5k
    @LastNameOptional-s5k หลายเดือนก่อน +11

    "Is this here intentionally?"
    When your coworker did something extremely dumb, but you still try to be professional instead of calling them an idiot.

    • @bendaonfire0078
      @bendaonfire0078 หลายเดือนก่อน

      This is how to tell the diff btw a regular coworker and a friend coworker. Cus a friend i would prob be like: bruh wtf

  • @GodDamnitTwitch
    @GodDamnitTwitch หลายเดือนก่อน +65

    interesting you are seeing more and more of these attempts to backdoor large projects that are open source, it seems like a concerted effort but man you are just seeing it more and more nowadays.
    neat video eric

    • @adamk.7177
      @adamk.7177 หลายเดือนก่อน

      Cyber attacks are becoming more frequent worldwide. It's not a surprise.

    • @fontenbleau
      @fontenbleau หลายเดือนก่อน

      The explanation is simpler, because openai & others selling ai agents services and many don't care what you doing with them. One american already waiting court with 16 years jail for Spotify thing.

    • @therealb888
      @therealb888 หลายเดือนก่อน +1

      It's not just the big ones, I believe a lot of no name repos are probably full of malware too. We don't know for sure whether smaller projects are being targeted or not.
      Recently I came across a big open source AI project with thousands of stars where the developers themselves were harvesting user emails or something. Man I love to tinker and explore open source but this is holding me back. ;-;

    • @balsalmalberto8086
      @balsalmalberto8086 หลายเดือนก่อน

      More backwater third world countries got internet access?

    • @sarcasmenul
      @sarcasmenul 29 วันที่ผ่านมา

      Fuck off racist twat, those countries are only backwater because we exploit them and turn them into smoking crater when they dare revolt.

  • @Soccera0
    @Soccera0 หลายเดือนก่อน +38

    idk, writing or fixing documentation isn't a job most people like to do so I think it's just as valid as a small bug fix.

    • @mattymerr701
      @mattymerr701 หลายเดือนก่อน +7

      The issue is people spamming small pulls instead of just bundling lots of documentation changes into one pull I think.
      It wastes maintainer time and is used to pad out contribution stats for job searching

  • @sfisher923
    @sfisher923 หลายเดือนก่อน +56

    The one thing I learned from DDLC is to be weary of the "Import os" function that game uses it pretty responsibly to Add in some spooky looking image files/deletes certain files in a subfolder of the install directory overall not malicious/harmful to the OS

    • @Bardomp
      @Bardomp หลายเดือนก่อน +64

      Please use punctuation, I almost died reading that, no offense.

    • @basedSkeleton
      @basedSkeleton หลายเดือนก่อน +53

      I literally died reading that. (take offense)

    • @MrDavibu
      @MrDavibu หลายเดือนก่อน +18

      The easier thing is looking at exec functions.
      Exec is rarely necessary for a program and using exec on some random numbers should be quite obvious redflag.
      If exec is used it should be obvious of what it does, because it can be a security risk even without a payload.

    • @wrob08
      @wrob08 หลายเดือนก่อน +3

      Why would I get tired of a function?

    • @amagicmuffin1191
      @amagicmuffin1191 หลายเดือนก่อน +1

      *wary

  • @uvaishassan
    @uvaishassan หลายเดือนก่อน +33

    "Um... whatcha got there?"
    "A smoothie"

  • @JordanManfrey
    @JordanManfrey หลายเดือนก่อน +8

    if you see anything that even resembles this in a PR and it doesn’t set off every alarm bell in your brain please quit programming forever

  • @ross825
    @ross825 หลายเดือนก่อน +22

    Docs only pulls are great if you actually clarify or fix something. I have never had a PR like that rejected.

    • @futuza
      @futuza หลายเดือนก่อน +10

      They're sometimes shady because it just becomes someone that's doing clout chasing and adds nothing of real value. eg: they add useless documentation based on what a LLM recommends. More commonly I see people trying to fix code issues based on having a LLM look at the code and make mass recommendations. Something like recommending that a pointer be set to null, even though it goes out of scope the very next line or something equally useless.

    • @boredkarma
      @boredkarma หลายเดือนก่อน

      ​@@futuza"Now that I fixed 1 line of grammar, I can finally add 'AOSP Contributor' in my bio 🥸"

    • @mina86
      @mina86 27 วันที่ผ่านมา +1

      ​@@futuzaadding and fixing documentation adds value though.

    • @futuza
      @futuza 27 วันที่ผ่านมา

      @@mina86 Sure, if it was actual documentation and not AI generated slop that may be completely hallucinatory.

    • @mina86
      @mina86 27 วันที่ผ่านมา +1

      @@futuza, at the moment you’re the one hallucinating though. This comment thread started with assertion that documentation changes which *actually clarify or fix something* are good. And then you jump onto a non sequitur about language models.

  • @deusexaethera
    @deusexaethera หลายเดือนก่อน +12

    I'm a desktop developer. I've been allergic to external function calls for DECADES. If the code isn't in my codebase or in whatever known and vetted framework I have to use, it doesn't get used at all. I'll just write my own.

    • @roboko6618
      @roboko6618 หลายเดือนก่อน +11

      Problem with this is thousands of developers like you rewriting the wheel with no-offence-intended often mediocre implementations each with their own unique bugs.

    • @nestwr
      @nestwr หลายเดือนก่อน +1

      brother at that point disconnect from the internet entirely. airgap everything. do you make your own computer languages? they can be exploited just as easily as any third party project. how do you know your chip doesn't have any security flaws? or your motherboard bios download isn't getting MitM'd?

    • @not_herobrine3752
      @not_herobrine3752 หลายเดือนก่อน +2

      kinda based ngl, i should also give practices like "minimising external function calls to a bare minimum" a try

    • @deusexaethera
      @deusexaethera 29 วันที่ผ่านมา

      @@nestwr : What a bunch of horseshit. Compiled code can be security tested after compilation. Third party external function calls can't be, because you never know when the external code will get changed. But by your logic, I can never be completely sure someone won't dynamite my front door, shoot me, and steal everything I own, so I might as well just leave the doors open. No thanks. Reasonable precautions produce a significant benefit in the real world, where I live.

    • @deusexaethera
      @deusexaethera 29 วันที่ผ่านมา

      @@roboko6618 : That's why frameworks exist. Known and vetted code with established accountability for bugs to get fixed. That's fine, go ahead and use frameworks. But I'm not going to use some random person's closed source API that they shared on the internet and hope it keeps working right and isn't malicious. I trust my own skills more than I trust random people's coding skills, and I have the asymptotic decrease in bug reports on projects I've worked on to support their confidence.

  • @justbobinaround7279
    @justbobinaround7279 หลายเดือนก่อน +5

    This kind of obfuscation gives me so much second-hand embarrassment lol. They could have at least tried to encode the bad stuff into utf-8 white-space and make it look like some kind of actual commit. Honestly, it'd probably be less noticeable to just add the actual code and not call exec at all.

  • @AL_O0
    @AL_O0 หลายเดือนก่อน +7

    this is far too obvious it makes me feel like this could have been done to attempt to cover up some actually hidden backdoor somewhere else

  • @RandomGeometryDashStuff
    @RandomGeometryDashStuff หลายเดือนก่อน +10

    06:09 also check if standard library has what you want

  • @Toleich
    @Toleich หลายเดือนก่อน +34

    I always assume these kinds of attacks are State actors.
    Only a government employee would be so lazy.

    • @spiroxylo2247
      @spiroxylo2247 หลายเดือนก่อน +1

      well, State actors attacking stuff are more subtle (jia Tan, Pegasus, etc), this is really script kiddy stuff

    • @TomJakobW
      @TomJakobW หลายเดือนก่อน +5

      You should look at it this way, rather (and I am not that cynical myself, but for security reasons you should always overestimate the offense and underestimate the defense): if you want the gov to do something, they are lazy; if you don’t want them to do something, they are incredibly laborious.

  • @pretoasted
    @pretoasted หลายเดือนก่อน +17

    Assuming someone looks at what was changed; It's not fooling anyone. The bigger problem is people just accepting commits without bothering to check out what changed. Once we have really good software to scan for weird stuff like this reliably, then we can let that system deal with it; But we're not there yet... at least in this repo.

  • @MartinWoad
    @MartinWoad หลายเดือนก่อน +3

    Static code analysis on a PR level is the way to go here. eval, exec, base64, high entropy should all be red flags to check, especially in directories where they have no place to be in. Semgrep is a good tool for it.

  • @markmental6665
    @markmental6665 หลายเดือนก่อน +4

    This is why I loved how Linus Torvalds ripped people a new asshole for making bad Linux kernel pull requests

  • @RandomGeometryDashStuff
    @RandomGeometryDashStuff หลายเดือนก่อน +20

    04:38 add `exec=print` to start of file?

    • @snudget
      @snudget หลายเดือนก่อน +6

      This doesn't catch every case. Python has some sneaky ways of doing stuff. The simplest thing would be using __import__('builtins').exec.
      There are even sneakier ways like replacing the binary code of a lambda function.
      So manual checking is still the way to go

    • @AlexanderVulpes
      @AlexanderVulpes หลายเดือนก่อน +1

      @@snudget Maybe the only safe way is not to copy-paste any into Python at all. e.g. load the string from another file, or load the list as json

    • @-rate6326
      @-rate6326 หลายเดือนก่อน

      ​@@AlexanderVulpes only safe way to do this is compile custom python version.

    • @spiroxylo2247
      @spiroxylo2247 หลายเดือนก่อน

      or use a find and replace ffs this was painful to watch

    • @theRPGmaster
      @theRPGmaster หลายเดือนก่อน

      exec=raise Exception('PANIC PANIC PANIC')

  • @CementPosting
    @CementPosting หลายเดือนก่อน +6

    You have been making absolute bangers of videos recently man.

  • @Wock_Codes
    @Wock_Codes หลายเดือนก่อน +27

    if i write some in batch code will that make me a pro hacker since batch is a hacker languge

    • @EL_DIABLOMATEO09
      @EL_DIABLOMATEO09 หลายเดือนก่อน +10

      No

    • @Wock_Codes
      @Wock_Codes หลายเดือนก่อน

      @@EL_DIABLOMATEO09ik im jokin😭

    • @SuperBotcreator
      @SuperBotcreator หลายเดือนก่อน +6

      Yes

    • @user-ro1cc8tz6d
      @user-ro1cc8tz6d หลายเดือนก่อน +5

      it would make you a pro elite wine prefix hacker while you try to join your friends on the next popular game (you will fail to do so and bootup winwows)

    • @TomJakobW
      @TomJakobW หลายเดือนก่อน

      a leet one, even! 🔢🔡🔣👨‍💻

  • @JamesMCrutchley
    @JamesMCrutchley หลายเดือนก่อน +2

    What worries me is not this sort of obvious bad PR's but stuff where using plausible denialability can be used. Example is a line of code where there is a bug introduced by way of poor coding that opens up a huge flaw. I'm also aware of at least three bugs I have fixed income I wrote where I did that by accident.

  • @kratosgodofwar777
    @kratosgodofwar777 หลายเดือนก่อน +3

    Lmao he changed literally 2 files and thought no one would notice bruh

  • @amsyary1
    @amsyary1 หลายเดือนก่อน +8

    i think he is from indonesia, the word sandi and gagal is indonesia word

    • @BayuFanani
      @BayuFanani หลายเดือนก่อน +2

      Name also likely indonesian 😅

    • @PDD555
      @PDD555 หลายเดือนก่อน

      His youtube channel is linked in GitHub so yeah, he seems to be

    • @jacobamarjan2325
      @jacobamarjan2325 6 วันที่ผ่านมา

      probably Indonesian high school kids that just learned to code and want to be naughty

  • @user-account-not-found
    @user-account-not-found หลายเดือนก่อน +3

    I can't believe his parents named him Evil Dojo 666, so progressive.

  • @YumekuiNeru
    @YumekuiNeru หลายเดือนก่อน +3

    2:20 it is nice enough to close the connection it opened so it has that going for it

  • @_zeeblo
    @_zeeblo หลายเดือนก่อน +7

    my anxiety watching you paste the malicious code into your IDE 📈📈📈

  • @Greenmarty
    @Greenmarty หลายเดือนก่อน +4

    How convenient for corpos who need to fix their reputation known for bad code, privacy concerns or even security breaks.

  • @kidmosey
    @kidmosey หลายเดือนก่อน +2

    Another way is to add a submodule dependency to something legitimate and common, like 'fast_string_cat'
    Then, in a few years, after you've gotten your dependency merged into dozens of repo's, you update your fast_string_cat repository. How many devs actually code review updated submodules?

  • @BigLongRandomNumberNameM-kf9vy
    @BigLongRandomNumberNameM-kf9vy หลายเดือนก่อน +5

    That's the sloppiest shit I've ever seen

  • @iAmTaki
    @iAmTaki หลายเดือนก่อน +14

    I rarely use third-party libraries because of this. I have no idea what is in the code. Unless it's something it would take months for me to do it myself or that is beyond my abilities, I'm not shipping someone else's code to users.

    • @Daijyobanai
      @Daijyobanai หลายเดือนก่อน +3

      And this is not how modern web development works. I don't think anyone has read most of what's on npm for a decade *scared face emoji goes here*

    • @poleve5409
      @poleve5409 หลายเดือนก่อน +7

      You might as well not use the internet, every software or website ever made relies on "third party" libraries

  • @proosee
    @proosee หลายเดือนก่อน +1

    I think that "implement on your own" vs "use library" dilemma is kinda false - you probably should use library, because less code you maintain on your own the better and library will be proportionally to its popularity more tested and efficient, but the real issue here is that you need to trust the library's maintainers. There are always exceptions of course, so universal answer "it depends" still holds, but generally I'd say: use libraries where you can, but only if you trust their maintainers.

  • @leasenok
    @leasenok หลายเดือนก่อน +1

    Lets all love Lain!
    ( i was kinda little confused when saw lain as user directory in PS, because i have it too XD )

  • @WofWca
    @WofWca หลายเดือนก่อน +2

    Such a low-effort attempt, I feel bad for this guy

  • @Michael-it6gb
    @Michael-it6gb หลายเดือนก่อน

    We need teams of people out there reviewing code on a regular basis for major open source apps. Sadly that requires lots of resources, lots of money. I'm a programmer myself, got a degree, I don't really do it anymore, but even I would have difficulty detecting something malicious or "hacker-friendly" code. Not to mention, already compiled code could been messed with by altering the given source. What we see on Github and downloading some final compiled file of that app could be different.

  • @12washere
    @12washere หลายเดือนก่อน +1

    Gagal basically means "Failed", on Malaysian/Indonesian Language.

  • @Dr_Larken
    @Dr_Larken หลายเดือนก่อน

    I like how you broke it down and opened it up in a virtual machine, you should do more! Really enjoyed it

  • @skeleton_craftGaming
    @skeleton_craftGaming หลายเดือนก่อน +1

    It would be trivial to implement a feature that when you use unsafe functions in a PR that it automatically rejects the request and asks for an explanation [and where applicable suggests safe alteratives] sure it will be a little anoying for the like 2 people who are using exec correctly but that will remove this verry hard to detect attack vector

  • @HyeL
    @HyeL หลายเดือนก่อน +17

    Why has github no virus scanner, that slaps a big red warning on any code strings like this? Must be not to difficult to detect.

    • @sontapaa11jokulainen94
      @sontapaa11jokulainen94 หลายเดือนก่อน +17

      It has. It is called static code analysis and it can be enabled for projects, but maybe they didn't have it enabled for some reason or configured it incorrectly that it didn't recognize this payload? Usually the static code analysis is done as a part of your "test" pipeline in GitHub.

  • @BrunodeSouzaLino
    @BrunodeSouzaLino หลายเดือนก่อน +20

    And sometimes they have funny names like Linus Torvalds.

  • @mzakyr342
    @mzakyr342 หลายเดือนก่อน +3

    gagal means fail

  • @pyrojackson9001
    @pyrojackson9001 หลายเดือนก่อน +3

    This makes me skeptical of all the open source software I use- oh wait I use Linux I am cooked. Jokes apart day by day github is getting scary and my paranoia suggests that it was a scary place before but people are just finding out about it now

    • @markmental6665
      @markmental6665 หลายเดือนก่อน

      Don't be overdramatic lmao just be vigilant and careful when running untested stuff from GitHub

  • @crxssed7
    @crxssed7 หลายเดือนก่อน +2

    surely no one is actually merging these PRs? its so obviously malicious code.

  • @soviut303
    @soviut303 หลายเดือนก่อน +1

    I have not once encountered an open source project that wasn't happy to receive documentation updates. Since when have they been "controversial"?

  • @Myexpectationsarerealistic
    @Myexpectationsarerealistic หลายเดือนก่อน +1

    Good lord these hackers would actually be worth something if they went out and spent time building better software. What a waste of life.

  • @eliasshemsu5853
    @eliasshemsu5853 หลายเดือนก่อน +8

    These people are dragging humanity backwards.

    • @Blood-PawWerewolf
      @Blood-PawWerewolf หลายเดือนก่อน

      They’re trying to make “open source” no longer safe to exist.

  • @anon_y_mousse
    @anon_y_mousse หลายเดือนก่อน

    I'm seeing a troubling trend in professional software that may mean open source is our only path to safety, security and privacy. Unfortunately, politics is corrupting open source on a level never seen before and we may eventually have to all write our own software to ensure we're safe, secure and private. The future doesn't look good.

  • @DerSolinski
    @DerSolinski หลายเดือนก่อน

    The most terrifying part, once in a while they get merged.

  • @sr_kaio
    @sr_kaio หลายเดือนก่อน +6

    it's all jia tan's fault

  • @TBRHS
    @TBRHS หลายเดือนก่อน +1

    Not me thinking he was going to open Photoshop somewhere in the video.

  • @al_lazy3519
    @al_lazy3519 หลายเดือนก่อน

    3:43 I wonder if github is going to do anything about it if he deleted the secondary files, they sure didn't care when the dude that made the peacenotwar malware hid all traces of it and closed all issues

  • @BellatrixLugosi
    @BellatrixLugosi หลายเดือนก่อน +2

    as indonesian i know this guy and i feel ashamed

  • @raffertymetcalfe
    @raffertymetcalfe หลายเดือนก่อน +1

    20/1 odds some proprietary company is behind these. OpenAI I'm looking at you

  • @Zel-kr3qj
    @Zel-kr3qj 23 วันที่ผ่านมา

    You know what's more infuriating? I report malicious content to domain registrars and hosting providers, and they do absolutely NOTHING about that

  • @danielsanichiban
    @danielsanichiban หลายเดือนก่อน

    I hope there are automated checks watching for this, and not just other contributors and managers

  • @JosephDalrymple
    @JosephDalrymple หลายเดือนก่อน +1

    Love how the username is `evildojo666`. This wasn't even a sophisticated attack. It was the most blatantly obvious attack I've ever seen 🤣

  • @test-rj2vl
    @test-rj2vl หลายเดือนก่อน

    Make some automated code review tool that would prevent merge if it has detects int array or hex array so that only repository owner can manually approve it if it turns out to be actual legit code. This way juniors/students just need some first project to work and therefore may not care as much on won't get to merge this. And alternatively you could block merges if line is more than 150 chars long for example so that any attempts to start line with many spaces will get caught.

  • @junzhengca
    @junzhengca หลายเดือนก่อน

    There is no way this is a real intentional PR to get malware in. Even highschool me wouldn't have done such a obvious obfuscation.
    So I can guarantee you there have been MULTIPLE backdoors in popular open source applications right now.

  • @randomblogger2835
    @randomblogger2835 หลายเดือนก่อน

    Automated scanners? that's never been foolproof in the past.

  • @ozelot131
    @ozelot131 23 วันที่ผ่านมา

    Not only the exec should be suspicious. Also the list of integers is suspect. There's no reason why you need an unnamed list of integers...

  • @mertbasa
    @mertbasa หลายเดือนก่อน +3

    use exec=print to overwrite it

  • @sovenok-hacker
    @sovenok-hacker หลายเดือนก่อน +1

    If someone thinks this is a real backdoor, this is just an AI anti-backdooring engine test

  • @baglad
    @baglad หลายเดือนก่อน

    This is like one of my pr's in work... turning 2 lines of code into a 10 minute conversation...

  • @kipchickensout
    @kipchickensout หลายเดือนก่อน +2

    At least these here are very obvious, assuming the reviewers actually review everything

  • @disquettepoppy
    @disquettepoppy หลายเดือนก่อน +2

    i know it's off-topic, but just by seeing "e/acc" in the username i have an immediate disgust response

  • @גוגל.קום
    @גוגל.קום หลายเดือนก่อน

    novice here, if i disable powershell in optional windows features would I be immune to the malware that try to run powershell scripts/commands?

    • @theRPGmaster
      @theRPGmaster หลายเดือนก่อน

      I don't think that would actually disable it fully, but I might be wrong. You can test that by running some harmless command with Python exec. Even if you disable powershell, it might just execute in CMD (the older command processor).

    • @גוגל.קום
      @גוגל.קום หลายเดือนก่อน

      @@theRPGmaster ah yeah that's a good point

  • @jacobstamm
    @jacobstamm หลายเดือนก่อน

    Anyone who doesn’t like PRs which only correct documentation is someone who thinks the purpose of OSS contribution is green square clout. It’s missing the point entirely. That aspect of this malicious PR obviously isn’t the part that was problematic.

  • @the_original_dude
    @the_original_dude หลายเดือนก่อน +4

    These attempts are so pathetic.
    It's like when I opened an issue, and someone respond with "hey, I have a fix for you, download this, and execute this here binary".
    If someone falls for these kinds of attempts, they shouldn't be involved in FOSS.

  • @gigiperih
    @gigiperih หลายเดือนก่อน

    By the way the else function that print “gagal”, it’s an Indonesian languange means “failed”

  • @BayuFanani
    @BayuFanani หลายเดือนก่อน

    Thanks for the video it's really eye opening. I used to like just use whatever without reading lol

  • @darz_k.
    @darz_k. หลายเดือนก่อน

    Good video. And info.
    As an aside - notice how quickly that microsoft 'update' fiasco died down?
    I mean...it wasn't a small thing eh?

  • @GBL_dev
    @GBL_dev หลายเดือนก่อน

    this is not a "innocent looking PR" ad the Alex Cheer describes it LOL

  • @shadow-ht5gk
    @shadow-ht5gk หลายเดือนก่อน

    embarrassing how they think they can get away with it

  • @mikescholz6429
    @mikescholz6429 หลายเดือนก่อน

    Who is they? Thinking about my current project, huge block of JS looks like obfuscated text, is actually raw dogging the bit register of I2C bus because linux kernel driver is more broken than a car accident.

  • @iswm
    @iswm 10 วันที่ผ่านมา

    >"innocent looking"
    >obvious call to exec() with obfuscated code
    ok. 🙄
    honestly this is more indicative of the comically amateur state of open source software and the incompetent developers thereof.

  • @SimplyDuker
    @SimplyDuker หลายเดือนก่อน

    "There's no such thing as a free lunch".
    At least these mfs are here to remind us of that. A necessary evil, dare I say.

  • @owacs_ender
    @owacs_ender หลายเดือนก่อน

    "Is this here intentionally?"
    dtnewman knows what's up.

  • @asdfjkl227
    @asdfjkl227 หลายเดือนก่อน

    Going to start reading some of the source code for open source software I use.

  • @yobson
    @yobson หลายเดือนก่อน +2

    bro is not jia tan

  • @georgecop9538
    @georgecop9538 หลายเดือนก่อน

    The Reddit Writes Code one is just a rickroll, I decoded it. They used Unicode characters to obfuscate it + selenium to open the link in a browser

  • @bobofthekerbals9797
    @bobofthekerbals9797 หลายเดือนก่อน +3

    Wouldn’t be surprised if it’s someone’s job at the CIA to just try and put these in as many open source projects as possible

    • @OceanusHelios
      @OceanusHelios หลายเดือนก่อน

      Stay tuned for more movies that play in the heads of paranoid people's minds. You think nerdy github folks are prime targets for the CIA? You think the CIA doesn't have algorithms to sniff out and vet real threats versus goobers who watch too much FOX news?

  • @splunge2222
    @splunge2222 หลายเดือนก่อน

    Unfortunately, automated scanning with be met with a ton of automated scamming.

  • @VNR_clips
    @VNR_clips หลายเดือนก่อน

    That dude must have lost his job to the U-net 😭

  • @savagetheunicorn4555
    @savagetheunicorn4555 หลายเดือนก่อน +2

    stealthy vm video when? :c teased it but hasn't dropped yet haha

  • @mintoo2cool
    @mintoo2cool หลายเดือนก่อน

    pretty sure the string @ 3:58 was base64 encoded ..

  • @xTobsecretx
    @xTobsecretx หลายเดือนก่อน

    I’m surprised this kind of shit doesn’t get caught by their CI? Exec and eval should be used so rarely.