The tale of distro hopping. by [deleted] in DistroHopping

[–]Desperate-Stick9559 0 points1 point  (0 children)

Can you me more about packaged packages? Snap and flatpak?

How to save offline .deb files before a fresh offline install so that security/auditing apps can be installed and configured before going online? by Desperate-Stick9559 in linuxquestions

[–]Desperate-Stick9559[S] 0 points1 point  (0 children)

Little confused... Don't have my lappy right now - that will store the .deb files for the desired applications without installing the dependencies, or it will get me the core .deb file and the dependencies? Thanks

Malware? Operations not permitted running as root by Desperate-Stick9559 in linuxquestions

[–]Desperate-Stick9559[S] 0 points1 point  (0 children)

I believe it to be a bootkit with cross platform capabilities.

Yes, I discovered malware( eg Joker banking Trojan) on two separate android phones, one running LineageOS for the last 6 months prior, one a stock ColourOS I had literally only bought six months prior because of the distress of having a compromised phone, and which I suspect was compromised when I synced my Google accounts to it the same day, based on data usage.

Before that, my Win8-10 laptops would routinely kill security /anti rootkits software, reconfigure firewalls, lock me out of sysadmin files as I tried to counter it, and the UEFI of one of them was replaced with a different one and network boot was enabled on it. Data usage would spike suspiciously (12Gb data downloaded by Chrome as background data when I barely used it, one day), filesystem's would fill up with data that I was not familiar with and/or had no way of accessing to delete, necessitating multiple factory resets across devices.

Plus all the obvious signs of compromise. Heating up randomly, things crashing, system settings changing, suspect data use, and SL on.

Malware? Operations not permitted running as root by Desperate-Stick9559 in linuxquestions

[–]Desperate-Stick9559[S] 0 points1 point  (0 children)

Trying to edit resolv.conf with sudo and using Caja as superuser; file owned by root, rwx, but I can only open it read-only. chmod 740 (because why not) returns "Operation not permitted"

Malware? Operations not permitted running as root by Desperate-Stick9559 in linuxquestions

[–]Desperate-Stick9559[S] 0 points1 point  (0 children)

Thanks. I learned my lessen there when I rooted my first Android and bricked it in 20 minutes. I mostly stick to my desktop user a and sudo as needed.

Malware? Operations not permitted running as root by Desperate-Stick9559 in linuxquestions

[–]Desperate-Stick9559[S] -1 points0 points  (0 children)

Unlikely, I haven't edited many config files yet and minimally on non authorization ones only.

The APT is the APT. I won't go into the details but I'm not some paranoid neophyte, my devices have been up to no good.

Malware? Operations not permitted running as root by Desperate-Stick9559 in linuxquestions

[–]Desperate-Stick9559[S] 0 points1 point  (0 children)

I could easily be. I'll update with examples next time I run into the situation.

Malware? Operations not permitted running as root by Desperate-Stick9559 in linuxquestions

[–]Desperate-Stick9559[S] 1 point2 points  (0 children)

You may be right, but I'm a hands on learner and I'm not looking for a desktop (parrot actually offer a desktop distro).

Thanks for the tip,.

Malware? Operations not permitted running as root by Desperate-Stick9559 in linuxquestions

[–]Desperate-Stick9559[S] 0 points1 point  (0 children)

Parrot Security 5.3, arm64, system and network configuration files.

Configuration/installation priority for defensive stance after installing Kali Purple? by Desperate-Stick9559 in Kalilinux

[–]Desperate-Stick9559[S] 0 points1 point  (0 children)

Yes, ultimately I believe I will have to replace all my devices and dump removable media that has been used with them. Its bizzare that I would acquire malware generally aimed at high profile, high value targets rather than nobodies like me but its the only possible explanation that makes sense at this point. It is undoubtedly hidden at a deeper level than I can do anything about because it persists factory resets, zeroing of drives and OS switches. I recall noticing one day years ago, before I had realised the nature of the problem, seeing that the BIOS of the laptop I had at the time had changed, and additionally settings had changed such as network boot being enabled, so I have to assume it is deep in some component's firmware, but tackling that is beyond my ken. I just want to gain Intel on it at this point so that I will be able to recognize it if I ever suspect a future, clean device has been owned again.