Follow

"Numerous orgs hacked after installing weaponized open source apps" (PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording)

arstechnica.com/information-te

@lupyuen “ZINC—Microsoft’s name for a threat actor group also called Lazarus” <= Microsoft that say “don’t install open source software, that’s dangerous”… Is it really reliable source or not??? ^^. At least it seems it only is enabled on Windows version of these opensource software, and the source of these binaries is not given, so impossible to know which servers give them… without verifying the source/control sums.

@popolon @lupyuen The official versions are not affected, these are malicious binaries distributed through WhatsApp links, quite simple spear-phishing that can happen with Linux versions or other apps in exactly the same way. The article obfuscates that important detail a bit.

@momar @lupyuen but on Linux, you generally use package manager, so there is not this kind of risk. If you need to install application, still not in your package repository, you verify the source too. This is here a problem of basic security education among Windows users, and a try by Microsoft to discredit open source softwares, if there is any proof this really happen ^^.

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.