Skip to main content

Questions tagged [malware]

Malware is any software application which subverts the will of the legitimate owner of a computer, by means of force or subterfuge, with or without personal or monetary gain on the part of the creator.

1 vote
0 answers
134 views

Malware in a PDF

I opened a PDF yesterday. How large would a PDF be that has malware? The one I downloaded was approximately 5 MB. If I opened the PDF on a browser, would the browser be infected? For some context: I ...
4 votes
1 answer
658 views

Kinsing Malware entering via compromised Dockerhub Images?

I got a server infected with the Kinsing malware, which mines crypto on your server, maxing out your CPUs. The malware initially creates the files /tmp/kdevtmpfs and /tmp/kinsing If you delete these ...
0 votes
1 answer
418 views

Preventing Windows from seeing/tampering with linux drive

Is there a way to prevent a Windows 10/11 system to access/modify/delete data from a secondary linux drive? I understand I can encrypt the linux drive, but wouldn't the windows system be still able to ...
3 votes
1 answer
2k views

Potential router malware? Receiving "Access Denied" and other weird blocks from various websites

So I've been having some weird browsing behavior over the last few weeks and it's gotten a lot worse the last few days. I've been getting blocked/banned by various websites off and on. Here are a few ...
0 votes
1 answer
185 views

Is an antivirus needed for linux home usage when there is exchange of files with other OS e.g. Windows?

I was under the impression that an antivirus for Linux makes sense only for installing in business computers. Checking Norton/BitDefender/Karpesky I don't see any Linux option for the first or any non ...
1 vote
1 answer
90 views

How to update BIOS before BIOS infected Host reinfects BIOS?

I learned about the BIOS being able to be written to by malware. It reminded me I have a used laptop that performs noticeably slower than any comparable devices, so I went ahead an downloaded BIOS ...
166 votes
10 answers
26k views

How do you explain the necessity of "nuke it from orbit" to management and users?

When a machine has been infected with malware, most of us here immediately identify the appropriate action as "nuke it from orbit" - i.e. wipe the system and start over. Unfortunately, this is often ...
0 votes
1 answer
403 views

Rogue login to Google account after Windows clean install

Yesterday I downloaded a sketchy .exe on my Windows desktop and executed it. A command prompt window appeared then nothing abnormal happened. I tried running MalwareBytes but it didn't display any ...
1 vote
0 answers
60 views

GPU Firmware Infections through AUTOMATIC1111 (StableDiffuision)?

I would like to ask a question about a strange incident that occurred as a result of using the StableDiffusion tool AUTOMATIC1111 (https://github.com/AUTOMATIC1111/). Here's what happened: I used the ...
1 vote
2 answers
182 views

How does malware work when compressed?

I have read up on compressed folders of file types such as .zip, .rar and .7zip being the malicious file itself (excluding cases such as an .exe file being disguised as a .zip file etc...), only ...
1 vote
1 answer
445 views

Is persistence via scheduled tasks possible if the user is not elevated?

As far as I can tell, scheduled tasks may only be created by those in the Administrators group by default. Does that mean that persistence can't be achieved via this method without gaining elevated ...
0 votes
1 answer
18k views

Can my android phone get hacked if I share my hotspot?

I lent my mobile data to someone's computer and was not in the room while they were using it. Suppose they wanted to gain control/access to my android device. How easy would it be? As far as I know, ...
1 vote
0 answers
31 views

what snort rules can detect covert channels?

I'm new to snort. I'm trying to set up rules in snort to detect the presence of covert timing channels. Ideally, I would like to use pre-made rules like the snort community rules. So far, I've found ...
1 vote
2 answers
422 views

Is it possible to protect browser credentials from malicious processes?

What items should be considered to create a browser that prevents all access to stored credentials by a malicious process? Hardware attacks being out of scope. Are there public projects addressing ...
2 votes
2 answers
167 views

Malware in neural networks

Lately, there has been discussion about malware hidden inside deep neural networks, such as, EvilModel: Hiding Malware Inside of Neural Network Models (pdf). I understand the hiding part, but I would ...

15 30 50 per page
1
2 3 4 5
170