GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    LinuxWalt (@lnxw48a1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864} (lnxw48a1@nu.federati.net)'s status on Sunday, 18-Dec-2022 03:23:06 JST LinuxWalt (@lnxw48a1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864} LinuxWalt (@lnxw48a1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864}
    https://github.com/nim-lang/Nim/issues/17820

    #Nim-lang (falsely?) detected as Trojan by Windows Defender. This has been going on for over a year.
    In conversation Sunday, 18-Dec-2022 03:23:06 JST from nu.federati.net permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: opengraph.githubassets.com
      [CI] Check Nim's binaries aren't Virus · Issue #17820 · nim-lang/Nim
      Related to this forum post, it will be cool to use VirusTotal API to check this problem during the RC stage.
    • Embed this notice
      LinuxWalt (@lnxw48a1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864} (lnxw48a1@nu.federati.net)'s status on Sunday, 18-Dec-2022 03:33:15 JST LinuxWalt (@lnxw48a1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864} LinuxWalt (@lnxw48a1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864}
      in reply to
      https://www.theregister.com/2022/11/10/icexloader_malware_microsoft_users/ [www theregister com]

      And here's why the AV detects it. They don't have many samples written in #Nim, and most that they have are malware / trojans. But attackers are using more than just #Nim-lang. They're also using #GoLang, #DLang, and #Rust. This suggests that antivirus vendors need to get smarter.
      In conversation Sunday, 18-Dec-2022 03:33:15 JST permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: regmedia.co.uk
        Windows breaks under upgraded IceXLoader malware
        We're the malware of Nim!
    • Embed this notice
      LinuxWalt (@lnxw48a1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864} (lnxw48a1@nu.federati.net)'s status on Sunday, 18-Dec-2022 03:44:16 JST LinuxWalt (@lnxw48a1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864} LinuxWalt (@lnxw48a1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864}
      in reply to
      Speaking of that, the 2022-December Windows updates include some developer certificate revocations. They were being used to sign malicious drivers. If you have not updated yet, it is #time_to_update.

      > "In these attacks, the attacker had already gained administrative privileges on compromised systems prior to use of the drivers," Microsoft wrote, adding that its "investigation revealed that several developer accounts for the Microsoft Partner Center were engaged in submitting malicious drivers to obtain a Microsoft signature."

      > The IT giant stressed there had been no compromise of its own network and systems; this was a case of rogue developers submitting bad drivers, and waiting for Microsoft to wrongly OK them, and then use the code in the wild against victims, we're told.

      #Win10 #Win11 #Windows_Update #malware #patch_tuesday
      In conversation Sunday, 18-Dec-2022 03:44:16 JST permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.