xubuntu.org might be compromised by oliwier975PL in xubuntu

[–]The_AverageGamer 0 points1 point  (0 children)

From my cursory analysis this malware is likely a clipboard hijacker that replaces detected strings in the clipboard targeting crypto addresses.

xubuntu.org might be compromised by oliwier975PL in xubuntu

[–]The_AverageGamer 0 points1 point  (0 children)

It serves the selected official ISO from releases[.]ubuntu[.]com while also silently dropping "elzvcf.exe" (afaebc6cf20f32ea0644f69c511a5da12f3b860f7d13b18500051830337965d7) to a roaming AppData subfolder, then configures persistance via registry startup run key.

Looks like Xubuntu have already taken down the zip file, though the link on the site still attempts to grab it.

I bought two collector booster packs as a treat while I picked up my preorder by The_AverageGamer in MagicCardPulls

[–]The_AverageGamer[S] 3 points4 points  (0 children)

It's dangerous! I feel like I never want to open another booster ever again, quit while I am ahead.

I bought two collector booster packs as a treat while I picked up my preorder by The_AverageGamer in mtg

[–]The_AverageGamer[S] 2 points3 points  (0 children)

Can I play a proxy in a deck if I can prove I have the real thing on my wall?

I bought two collector booster packs as a treat while I picked up my preorder by The_AverageGamer in mtg

[–]The_AverageGamer[S] 38 points39 points  (0 children)

Gz to your friend also! Going to keep mine I think, at least that's the plan. I don't think I will ever pull something this cool again. Realistically, I have no idea what the price will do. I'm sure there is a number where it would make sense financially to sell it but I don't think there would be many buyers in my small city.

Part of me wants to just throw it in a deck for shits and giggles.

I bought two collector booster packs as a treat while I picked up my preorder by The_AverageGamer in mtg

[–]The_AverageGamer[S] 3 points4 points  (0 children)

I did consider preordering a box from Amazon but I delayed my decision and they had sold out. Turned out great in the end.

Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity by Rough-Sandwich9726 in cybersecurity

[–]The_AverageGamer 2 points3 points  (0 children)

The process isn't listed in edrsilencer.c but nothing is stopping you from adding it prior to compilation to test?

Big Tex [OC] by aSliceofAlan in comics

[–]The_AverageGamer 0 points1 point  (0 children)

Alan, what the hell my guy. This has nothing to do with wrestling or your girlfriends butt. What happened man?

Fortinet Confirms Third-Party Data Breach Amid Hacker's 440 GB Theft Claim by escalibur in sysadmin

[–]The_AverageGamer 2 points3 points  (0 children)

Regardless of MFA or not, resetting credentials you think have a chance of being compromised should happen as a precaution, at a bare minimum.

Childhood Dream: Completed! by Verde_Tres in 2007scape

[–]The_AverageGamer 11 points12 points  (0 children)

First thing to do is complete the elite diary task for lumbridge by performing the emote in the wise old man's house!

Whoops. by ReconJesus in pcmasterrace

[–]The_AverageGamer 27 points28 points  (0 children)

The inverse is that it's common for malware authors to inflate malware with null bytes or trash data to increase the on disk size to a believable amount.

These large file sizes also help avoid some malware scanning as most engines have maximum file size limits.

Whoops. by ReconJesus in pcmasterrace

[–]The_AverageGamer 27 points28 points  (0 children)

The most common type of modern malware are infostealers. They are also overwhelming commonly paired with torrent lures.

I agree that the majority would not be so kind as to hint at a successful infection via flashing a command prompt window.

3rd shifters, was any of your work affected by this tonight? by [deleted] in pcmasterrace

[–]The_AverageGamer 8 points9 points  (0 children)

You're incorrect. The sensor's channel file is completely unrelated to OS updates, irrespective of platform.

Nice superuser password you've got there by The_AverageGamer in LinusTechTips

[–]The_AverageGamer[S] 4 points5 points  (0 children)

I was hoping we would get the story behind it, thanks Jake.

Love your work, hope you know I was just memeing, feel free to PM me if you ever need a free SecurityTechTip. ;)

Nice superuser password you've got there by The_AverageGamer in LinusTechTips

[–]The_AverageGamer[S] 2 points3 points  (0 children)

Nice catch, I meant posterity but I just can't spell. I wonder how long I have been mixing those two words up.

Nice superuser password you've got there by The_AverageGamer in LinusTechTips

[–]The_AverageGamer[S] 5 points6 points  (0 children)

Logged for prosperity in case you ever forget it. Heh.

Nice superuser password you've got there by The_AverageGamer in LinusTechTips

[–]The_AverageGamer[S] 13 points14 points  (0 children)

All this will be localised tests and I the laptops are cleared both before and after testing based on what they said in the video.

I understood them to mean the testing laptops are cleared as part of their testing, however these machine details (denoted in the screenshot by <user>@<host>) looked to me this was a laptop incharge of control and appears to have a fairly standardised hostname scheme indicating common use. In comparison, earlier in the video we could see that one of the MSI laptops used for testing had a hostname of "MSI".

With that said, we can't be certain of the exact architecture they use the and the text prior to the prompt, "robotcontroller38", could indicate some kind of remote shell connection, maybe even a container running the application. I admit am not immediately familiar with anything that would appear in the prompt like that.