• 4 Posts
  • 83 Comments
Joined 3 years ago
cake
Cake day: December 20th, 2021

help-circle





  • These are not Drew’s words, he is quoting something said by the project dev. The context that the previous commenter ommitted is:

    Following my email conversation with Vaxry, he appeared on a podcast to discuss toxicity in the Hyprland community. This quote from the interview clearly illustrates the attitude of the leadership:

    [A trans person] joined the Discord server and made a big deal out of their pronouns […] because they put their pronouns in their nickname and made a big deal out of them because people were referring to them as “he” [misgendering them], which, on the Internet, let’s be real, is the default. And so, one of the moderators changed the pronouns in their nickname to “who/cares”. […] Let’s be real, this isn’t like, calling someone the N-word or something.


  • An open source project backed by a corporation that sells support. And… the open source community almost instantly turns on that and decides they are evil

    Redhat was the golden child of the open source community, the paragon of open source success stories, until fairly recently.

    Canonical was also very highly respected until they started putting Amazon ads into people’s menus.

    It is not something that happens instantly for no reason, it’s because of the need for these companies to squeeze every last drop of revenue out of a product to appease shareholders. Open source companies can, and do, thrive without screwing their communities over. The problem is the mindset that creating value for shareholders is the only thing that matters.





  • The Kaspersky analysis noted that the malware contained comments in the shell scripts written in Ukrainian and Russian, and used malware components detected in previous malware campaigns since 2013 that presumably have been attributed to a specific group.

    FTA:

    Meanwhile, the postinst script contains comments in Russian and Ukrainian, including information about improvements made to the malware, as well as activist statements. They mention the dates 20200126 (January 26, 2020) and 20200127 (January 27, 2020).

    Having established how the infected Free Download Manager package was distributed, we decided to check whether the implants discovered over the course of our research have code overlaps with other malware samples. It turned out that the crond backdoor represents a modified version of a backdoor called Bew. Kaspersky security solutions for Linux have been detecting its variants since 2013.

    The Bew backdoor has been analyzed multiple times, and one of its first descriptions was published in 2014. Additionally, in 2017, CERN posted information about the BusyWinman campaign that involved usage of Bew. According to CERN, Bew infections were carried out through drive-by downloads.

    As for the stealer, its early version was described by Yoroi in 2019. It was used after exploitation of a vulnerability in the Exim mail server.