this post was submitted on 27 Apr 2024
64 points (92.1% liked)

Technology

59377 readers
3806 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
64
Lorem ipsum (lemmy.world)
submitted 6 months ago* (last edited 6 months ago) by kadu@lemmy.world to c/technology@lemmy.world
 

Lorem ipsum

top 18 comments
sorted by: hot top controversial new old
[–] shortwavesurfer@monero.town 28 points 6 months ago (1 children)

This is a really hard way to learn to keep your personal accounts off of work devices. That has to hurt.

[–] kadu@lemmy.world 8 points 6 months ago* (last edited 6 months ago) (2 children)
[–] shortwavesurfer@monero.town 9 points 6 months ago

Why not relegate Windows to a VirtualBox environment? That way you can just turn it off when you're not using it and not need to reboot. You can use the guest additions and everything to get your proper native screen resolution and pass through USB devices etc.

[–] AmbiguousProps@lemmy.today 2 points 6 months ago* (last edited 6 months ago)

You can also get a KVM (and second machine) and keep them fully seperate that way. Some rootkits may still be able to infect both of your installs if you dual boot. Just depends on your paranoia level.

[–] ivn@jlai.lu 19 points 6 months ago (1 children)

This is the first time you noticed you caught a malware. I wouldn't be so confident about never having caught one and Im way more paranoid than you. This one was just really noisy.

[–] kadu@lemmy.world 5 points 6 months ago* (last edited 6 months ago) (1 children)
[–] ivn@jlai.lu 11 points 6 months ago

Those are just some uses of malwares. It's not always that noticeable.

[–] Entropywins@lemmy.world 16 points 6 months ago (1 children)

You can be the most diligent, tech-savvy, cyber warfare general of nato and all it takes is one second of not thinking and a click...

[–] Sabata11792@kbin.social 4 points 6 months ago

I totally never accidentally fell for the spam awareness email at Monday at 8am before my caffeine to hangover ratio was balanced while being the admin.

[–] cmnybo@discuss.tchncs.de 8 points 6 months ago

Was it an actual zip file that managed to exploit some vulnerability in the program that opened it or was it something like "filename.zip.exe" and windows hid the .exe part?

[–] mox@lemmy.sdf.org 5 points 6 months ago

A cautionary tale from the digital trenches. Good luck with the cleanup.

[–] IllNess@infosec.pub 5 points 6 months ago

Thanks for sharing. Sorry that happened to you and hope you got everything back in order.

Was it an .exe file that looked like a zip file that you opened? Or was there an executable in the zip file?

[–] Bipta@kbin.social 4 points 6 months ago

This might have been avoidable using a software firewall that doesn't defacto allow outbound connections.

That's a big maybe.

[–] Quacksalber@sh.itjust.works 3 points 6 months ago

And here I am, emailing password protected zip files to people when the documents are not to be scanned by my mail provider.

[–] Habahnow@sh.itjust.works 2 points 6 months ago (1 children)

Wait so you were logged into sensitive accounts? If you weren't, then your accounts wouldn't have been as compromised?

[–] kadu@lemmy.world 3 points 6 months ago* (last edited 6 months ago) (1 children)
[–] I_Miss_Daniel@kbin.social 3 points 6 months ago (1 children)

So I'm guessing they grabbed the %appdata% for Chrome and were able to get the passwords out of that?

[–] kadu@lemmy.world 2 points 6 months ago* (last edited 6 months ago)

lorem ipsum