CPUID site hijacked to serve malware instead of HWMonitor downloads (www.theregister.com)
from cm0002@infosec.pub to cybersecurity@infosec.pub on 11 Apr 05:58
https://infosec.pub/post/44785544

#cybersecurity

threaded - newest

theunknownmuncher@lemmy.world on 11 Apr 07:09 next collapse

Linux package repositories win again. Downloading random executable files from sketchy websites will always be stupid

EDIT: laughing so hard at the cope from windows users 😂 stay fully in denial and enjoy your self-installed viruses

Brkdncr@lemmy.world on 11 Apr 07:56 next collapse

Oh sweet summer child…

theunknownmuncher@lemmy.world on 11 Apr 08:10 collapse

Nah. Nothing is perfect of course, but normalizing executing software sourced from random, untrustworthy websites will always be objectively worse than curated repos.

Cypher@aussie.zone on 11 Apr 08:22 collapse

It is hardly a random untrustworthy site, it is the software publishers site. There is no reason that a package repo can’t suffer a similar attack.

Your confidence is entirely misplaced.

theunknownmuncher@lemmy.world on 11 Apr 08:24 collapse

Oh I guess I should totally put my confidence in random sketchy websites. Great point!

It literally doesn’t matter if it’s a publisher site or not, users can’t tell the difference and it normalizes clicking links from a web search and running whatever software download the user sees first.

Cypher@aussie.zone on 11 Apr 08:26 collapse

Go on then, explain to me how the well known software publishers website is random and sketchy.

theunknownmuncher@lemmy.world on 11 Apr 08:28 collapse

I feel like you’ve demonstrated very effectively how users lack the skills to understand what they are reading online 😂

Cypher@aussie.zone on 11 Apr 08:38 collapse

It isn’t a random, sketchy or inherently untrustworthy site.

You shouldn’t have any issue explaining how you would go about verifying that a software repo is trustworthy and how that differs from verifying a website.

Unless you don’t actually know what you’re talking about…

theunknownmuncher@lemmy.world on 11 Apr 14:39 collapse

I’ll just paste what I already wrote in hopes that your reading comprehension benefits from reading it a second time:

It literally doesn’t matter if it’s a publisher site or not, users can’t tell the difference and it normalizes clicking links from a web search and running whatever software download the user sees first.

Again, louder this time, PACKAGE REPOSITORIES WILL ALWAYS BE OBJECTIVELY BETTER THAN RANDOM, UNTRUSTWORTHY WEBSITES.

Enjoy your ignorance and viruses

Cypher@aussie.zone on 11 Apr 16:31 collapse

It doesn’t matter if the software is delivered via a publishers website or via a package repository if the supply chain has been compromised.

Clearly you’re not aware of any recent cyber security news or you’d know that the NPM package manager has suffered numerous attacks: bleepingcomputer.com/…/shai-hulud-malware-infects…

I guess you should trust NPM though because its a package manager!

You’re just encouraging people to blindly use and trust repos with no understanding of the pros or cons, and without understanding how you can verify and test software yourself to reduce risk. This is especially an easy conversaion when we talk closed source vs open source and you failed to even bring that up.

Repeating nonsense claims instead of actually considering the entirely reasonable question only highlights that you’re victim to the Dunning-Kruger effect.

You could have had a conversation and learned something from an actual cyber security professional and instead you’ve acted like a clown.

theunknownmuncher@lemmy.world on 11 Apr 17:21 collapse

ItS nOt PeRfEcT sO iT cAnT bE bEtTeR

Cope.

Cypher@aussie.zone on 11 Apr 17:30 collapse

hehehe seethe about it clown

theunknownmuncher@lemmy.world on 11 Apr 17:34 collapse

You’re so close to understanding. All of the flaws that come with supply chain attacks on repos also apply to random websites, plus even more flaws that repositories are not as susceptible to or do not apply to repos at all.

Please quote me where I claimed that software repositories are less vulnerable to supply chain attacks.

You were wrong about something, constructed a strawman argument, and are grasping at straws to save face.

Cypher@aussie.zone on 11 Apr 18:34 collapse

rAnDoM wEbSiTeS

theunknownmuncher@lemmy.world on 11 Apr 18:37 collapse

That’s what I thought.

Are you done speed-running through as many logical fallacies as possible? Multiple strawman arguments, no true scottsman/appeal to authority, name calling/ad hominem. You wouldn’t have to resort to these if you were just correct, like me.

Cypher@aussie.zone on 11 Apr 19:02 collapse

Since you don’t understand, you lowered the level of the conversation and now I’m going to continue on that level because you get what you deserve.

Ad hominem is a problem now when you started accusing me of lacking reading comprehension aka stupidity and then ignorance - in a field I am a professional in and have given reasoned and valid advice on.

In multiple replies you failed to even attempt to address the elephant in the room; that you have zero fucking clue how to verify that applications delivered from a repo aren’t malicious.

Given a real world example you simply ignore it “but search results” eat shit you moron. The legitimate website was popped so “rAnDoM wEbSiTeS” aren’t a factor or relevant.

JuSt TrUsT iT bRo - nonsense uttered by an absolute fuckwit

theunknownmuncher@lemmy.world on 11 Apr 19:28 collapse

Addressing logical fallacies elevates the discussion to place where it can actually be productive, not lowers it.

In multiple replies you failed to even attempt to address the elephant in the room; that you have zero fucking clue how to verify that applications delivered from a repo aren’t malicious.

It’s not relevant because it applies to both random websites and code repositories equally. Again, please quote me where I claimed that code repositories are not susceptible to this.

Ad hominem is a problem now when you started accusing me of lacking reading comprehension aka stupidity and then ignorance

You’ve demonstrated both of these, so it is just statement of fact. “you moron” this you?

JuSt TrUsT iT bRo - nonsense uttered by an absolute fuckwit

Ironic, you’re the only one who has said those words. Another strawman. At no point have I supported just trusting anything.

Cypher@aussie.zone on 11 Apr 19:32 collapse

get ratiod fuckwit

theunknownmuncher@lemmy.world on 11 Apr 23:16 next collapse

All of the flaws that come with supply chain attacks on repos also apply to random websites, plus even more flaws that repositories are not as susceptible to or do not apply to repos at all.

Doesn’t change that this ^ is a fact you can’t refute, so I’m correct. Your entire argument is strawman arguing against claims that I’ve never made and name calling. You’re basically just arguing with yourself. 🤷

Krudler@lemmy.world on 12 Apr 01:43 collapse

You can’t tell after getting completely obliterated by downvotes and repeatedly rebutted that you’re the one in weeds? Clueless much

theunknownmuncher@lemmy.world on 12 Apr 02:25 collapse

And yet my point was never refuted

W98BSoD@lemmy.dbzer0.com on 12 Apr 03:27 collapse

<img alt="" src="https://lemmy.dbzer0.com/pictrs/image/7b834045-7eac-4d01-9dc6-e0e20613ef97.webp">

Not you, but some advice(?).

slazer2au@lemmy.world on 11 Apr 09:03 next collapse

Tell me you didn’t read the article without saying you didn’t read the article.

muusemuuse@sh.itjust.works on 11 Apr 17:54 collapse

XZ would like to have a word

the_riviera_kid@lemmy.world on 11 Apr 07:42 next collapse

I’m glad I keep an archive of everything I download.

BurgerBaron@piefed.social on 11 Apr 08:12 next collapse

Deja Vu

m33@lemmy.zip on 11 Apr 09:29 collapse

Notepad++ have been there too

Then you realize very popular software and their official website actually are a one man show. Nobody is perfect and those things tend to work for years without security in mind. At the time it were built, supply chain attack was not invented yet.

dogs0n@sh.itjust.works on 11 Apr 23:35 collapse

At the time it were built, supply chain attack was not invented yet.

I don’t have evidence, but I’m still gonna press X to doubt this claim.