I am but a cog in a machine. A lazy one though.

If you are new on Lemmy, check out: https://lemmyverse.net/communities for communities to join!

  • 6 Posts
  • 120 Comments
Joined 2 years ago
cake
Cake day: July 31st, 2023

help-circle
  • Lazycog@sopuli.xyztoMemes@sopuli.xyzDaily
    link
    fedilink
    arrow-up
    4
    ·
    2 days ago

    I hope my words can lift someone’s mood up! :)

    I’ve never bumped into the term before lemmy, but that’s probably because English is not my first language. In my native language it also sounds like that and I wouldn’t use it.


  • While I personally wouldn’t want this and agree with the comments about simplicity, old forum style, privacy talking points, I just don’t understand why people downvote this post.

    It’s a good question that creates good discussion (you know, purpose of lemmy) and doesn’t really lead to anything concrete necessarily. Just interesting discussion.

    People use downvote as a disagree button but it does have a real impact on the feed: this post will get buried by some post feed filters and some people will never see the good discussion going on in here.

    But to answer the question (even though there are already good answers): I personally think it’s also a stressful feature that will just make people feel like they need to answer to replies / will make lemmy look dead because only a handful of people use anything but “invisible” status.


  • Lazycog@sopuli.xyztoMemes@sopuli.xyzDaily
    link
    fedilink
    arrow-up
    18
    ·
    2 days ago

    It’s gonna be ok, you got this. We are all still just the little humans we were when we were children, in an adult body, with just more experience and knowledge than back then.

    It’s ok to feel overwhelmed, stressed, like an impostor, etc. You and everyone else have gotten through struggles before. This too shall pass.

    All you can do is your best, you can’t do more and that’s ok.











  • What the hell

    Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.

    “At first glance, it’s hard to believe that this is actually valid JavaScript,” the Veracode Threat Research team said. “It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work.”

    Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server (“firewall[.]tel”).

    This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain (“cdn.audiowave[.]org”) and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB (“i.ibb[.]co”).

    “[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it,” Veracode said. “It ultimately builds up in memory YET ANOTHER .NET DLL.”

    Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user.

    The newly-downloaded DLL is Pulsar RAT, a “free, open-source Remote Administration Tool for Windows” and a variant of the Quasar RAT malware.

    Honestly, at this point the hacker deserves to empty my bank account.








  • If it’s something that is not very popular/known I do actually look at the code, but never all of it.

    I check:

    • most recent commits
    • for something that might have been hidden before one of the releases
    • deeper into utility files
    • look for suspicious patterns in code that might be trying to hide something. Mostly for/in external network call related code

    This is of course very superficial and in general I try to avoid obscure projects that are not popular and well known.