Content
@
0 reply
0 recast
2 reactions
sudo rm -rf --no-preserve-root /
@pcaversaccio
guys, since people continue falling victim to attacks, here's another malware scheme that's been making the rounds recently: Scammers lure victims into a fake job interview using a fraudulent video conferencing application (tbh, that's nothing new). Now the application tricks users into thinking their camera isn't working, prompting (or being instructed) them to run a command shown in the first screenshot. Executing this command triggers a script that installs a Trojan on their device (as seen in the second screenshot). I obtained the malware for both ARM64 and x86_64 architectures and uploaded it to VirusTotal: - ARM64 VT hash: 0a49f0a8d0b1e856b7d109229dfee79212c10881dcc4011b98fe69fc28100182 - x86_64 VT hash: c6774961e12c14b91f6673ad47ce44d489cdbdd193e031ded367a36f531b6ab9 This is again a warning - PLEASE DO NOT INVOKE RANDOM CODE SOME RANDOM DUDES/APPLICATIONS SHARE WITH YOU. It can completely wreck you.
2 replies
3 recasts
19 reactions
Pau π© βοΈβπ₯
@p4u
Thanks for posting it! Its important to make the current attacks public, so ppl is aware. However this one, seems like a good way to test the candidate on Linux and security skills too. Downloading a random script and executing it with nohup... Looks quite suspicius. I think the "clone this repo and debug/fix the existing issue" as an interview step, its a much more dangerous attack vector.
0 reply
0 recast
1 reaction
tricil
@tricil
thank you for the heads up!
0 reply
0 recast
1 reaction