this post was submitted on 29 Oct 2023
114 points (91.3% liked)
Technology
58303 readers
17 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Not really trusting the source here.
https://www.pcmag.com/news/powerful-malware-disguised-as-crypto-miner-infects-1m-plus-windows-linux
Thank you, but I meant I don’t trust Kapersky themselves.
I used to use Kaspersky but I stopped about 10 years ago or so. I get why people don't trust having that software on their computers but personally I don't distrust their public reports (which is different from trust obviously). Just because I feel like other more technically minded people are going to look into this and there will be a confirmation or a denial eventually.
I've read about code from Stuxnet being used in other worms so it didn't surprise me that this is possible. I'm not a cyber security expert so it could all be nothing and I wouldn't know the difference. This is some rather technical stuff.
Anything is possible and it certainly seems more difficult to find truth these days, but I appreciate you posting.
👍
I believe Kaspersky used to be very persona non grata in Russia, and then someone either from Gazprom or similar made a buyout and now, not so much.
Nor should you, if you're American
Here’s the original report: https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/
It doesn’t specifically attribute this to the NSA, and it’s very hard to definitively say who created what malware anyways.
That being said, if you read through the report, the details on this really scream “state actor” most probably. The level of modularity, the infrastructure of the C2 server, and the detailed & flexible spying capabilities all point to some government agency more than anything else.