- UnverifiedAPK ( @UnverifiedAPK@lemmy.ml ) 85•11 months ago
It’s like that guy that posted an example Bitcoin miner on GitHub, then a bunch of script kiddies forgot to change his wallet info for their own before deploying… He made a good chunk of change by doing nothing malicious.
- CanadaPlus ( @CanadaPlus@lemmy.sdf.org ) 15•11 months ago
Dream job.
- Nato Boram ( @NatoBoram@lemm.ee ) English45•11 months ago
Should’ve written the malware in Go, smh
- vsis ( @vsis@feddit.cl ) English27•11 months ago
Sorry, folks. Using
cmalw-lib
is now deprecated.Cool kids are using
systemd-malwd
- schnurrito ( @schnurrito@discuss.tchncs.de ) 24•11 months ago
Isn’t this just a newer version of this? https://www.gnu.org/fun/jokes/evilmalware.html
- chinpokomon ( @chinpokomon@lemmy.ml ) 13•11 months ago
Even if it were inspired, it is significantly different the way it’s written. I’ve hit these same challenges before, so I’m more inclined to think it is independent discovery.
- LogarithmicCamel ( @LogarithmicCamel@feddit.uk ) 5•11 months ago
The newer one is a lot funnier though.
- Zozano ( @Zozano@aussie.zone ) 21•11 months ago
I guess the process could be regarded as gain of function research.
- ram ( @ram@feddit.nl ) 16•11 months ago
This reminds me of the old linux hater’s blog post “At least we don’t have any viruses”.
- AnarchistArtificer ( @AnarchistArtificer@slrpnk.net ) 9•11 months ago
That certainly was a blog with many emotions. Coming at this with no context, it looks like the kind of content that would be beautiful satire, except it’s probably not.
- ram ( @ram@feddit.nl ) 6•11 months ago
Linux Hater’s Blog was half satire and half honest criticism.
- murtaza64 ( @murtaza64@programming.dev ) 2•11 months ago
Seems like the prediction about the web panned out…
- Nowhereman ( @lemmy@lemmy.stonansh.org ) English14•11 months ago
i laughed so hard 😂 😂 😂
- Cwilliams ( @Cwilliams@beehaw.org ) 2•8 months ago
Text version:
Downloaded a virus for Linux lately and unpacked it. Tried to run it as root, didn’t work. Googled for 2 hours, found out that instead of
/usr/local/bin
the virus unpacked to/usr/bin
for which the user malware doesn’t have any write permissions, therefore the virus couldn’t create a process file. Found patched .configure and .make files on some Chinese forum, recompiled and rerun it. The virus said it needs the librarycmalw-lib-2.0
.Turns outcmalw-lib-2.0
is shipped with CentOS but not with Ubuntu. Googled for hours again and found an instruction to build a.deb package from source. The virus finally started, wrote some logs, made a core dump and crashed. After 1 hour of going through the logs I discovered the virus assumed it was running on ext4 and called into its disk encryption API. Under btrfs this API is deprecated. The kernel noticed and made this partition read-onlyOpened the sources, grep’ed the Bitcoin wallet and sent $5 out of pity.