this post was submitted on 09 Oct 2024
212 points (97.3% liked)
Technology
59168 readers
2104 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
It seems like they could be rendered ineffective by simply disabling auto run and forcing removable drives to mount noexec.
This should be the default on all PCs.
I thought we learned that like two decades ago.
https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
To be fair, you could compromise Windows 98 by looking at it funny.
It isn't? I remember as a kid trying to write custom autorun scripts for a flash drive on Windows 7 and I couldn't get them to work for the life of me. They worked in Windows XP though.
Does any Linux distro have autorun? Because Windows isn't really an OS anyway.
Windows isn't an OS? What kind of nonsense is this?
I'd say the team from DEC who created it, would differ.
It's more of an exploitation system than an operation system
Yes, Linux has autorun and some distros have it enabled by default.
You would be shocked at the amount of times employees would bring devices into our air gapped network.
Yeah our corporate machines won't run any external media. I assumed that was standard practice.
Well it’s believed it entices users to click the malware to run by disguising itself as the last accessed folder with the same name and folder icon.
In that case having the option to always show extensions enabled would be helpful for trained users who care to be careful.
It’s not that interesting sounding given we know the NSA and eyes countries have developed compromised firmware for certain hard drives to enable true spread without interaction or hope of prevention. Whenever I see one of these I wonder if it’ll be a case of compromising the device itself but it’s this old stuff instead which can be defeated with a good security posture.
Hidden file extensions is such a terrible default it amazes me that Microsoft is still doing that
macOS does this too shockingly despite using the file extension as a “hint” to the file type. I think it’s unique in that most UNIX/Linux systems use magic number and Windows blindly accepts that the file is of the type that matches the extension.
When the drive is mounted noexec it's not possible to run any programs on it. You can also mount any user writable directories noexec so they can't copy the program somewhere else and run it.