A newly discovered Linux malware dubbed ‘DISGOMOJI’ uses the novel approach of utilizing emojis to execute commands on infected devices in attacks on government agencies in India.

  • KISSmyOSFeddit@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    21 days ago

    So to get infected, you need to download and unpack a ZIP archive sent to you from an unknown address, then execute the file it contains? In that case, I’m not too worried.

      • sugar_in_your_tea@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        20 days ago

        Especially Linux malware. It’s not a huge target, so it’s likely to be low effort stuff like this instead of zero-days attacking some linux-specific API. That level of attack is reserved for higher value targets, like servers and windows.

        • KISSmyOSFeddit@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          20 days ago

          It’s not a huge target

          I never understood that claim. Most of the internet, most servers and most machine controllers, as well as most cloud services (including Microsoft Azure) run on Linux.
          It’s the biggest target in the world.

          • sugar_in_your_tea@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            ·
            20 days ago

            Linux servers are, and I specifically called that out. The types of attacks you use against a server are very different than attacks against a desktop. Most desktops don’t run web servers, and most servers don’t run discord or web browsers.

            So linux desktops should see a lot fewer attacks than servers because the value of successfully attacking them is much lower. As that changes, so will the amount of malware targeting linux desktops.

    • kernelle@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      20 days ago

      It’s more about C&C, novel ways to get around firewall restrictions. Deploying a payload is the hard part, but having control over a large botnet without raising red flags is an art as well.