Questions tagged [malware]
Malware is any software application which subverts the will of the legitimate owner of a computer, by means of force or subterfuge, with or without personal or monetary gain on the part of the creator.
2,549
questions
1
vote
0
answers
134
views
Malware in a PDF
I opened a PDF yesterday.
How large would a PDF be that has malware? The one I downloaded was approximately 5 MB.
If I opened the PDF on a browser, would the browser be infected?
For some context: I ...
4
votes
1
answer
658
views
Kinsing Malware entering via compromised Dockerhub Images?
I got a server infected with the Kinsing malware, which mines crypto on your server, maxing out your CPUs.
The malware initially creates the files /tmp/kdevtmpfs and /tmp/kinsing If you delete these ...
0
votes
1
answer
418
views
Preventing Windows from seeing/tampering with linux drive
Is there a way to prevent a Windows 10/11 system to access/modify/delete data from a secondary linux drive?
I understand I can encrypt the linux drive, but wouldn't the windows system be still able to ...
3
votes
1
answer
2k
views
Potential router malware? Receiving "Access Denied" and other weird blocks from various websites
So I've been having some weird browsing behavior over the last few weeks and it's gotten a lot worse the last few days. I've been getting blocked/banned by various websites off and on. Here are a few ...
0
votes
1
answer
185
views
Is an antivirus needed for linux home usage when there is exchange of files with other OS e.g. Windows?
I was under the impression that an antivirus for Linux makes sense only for installing in business computers. Checking Norton/BitDefender/Karpesky I don't see any Linux option for the first or any non ...
1
vote
1
answer
90
views
How to update BIOS before BIOS infected Host reinfects BIOS?
I learned about the BIOS being able to be written to by malware. It reminded me I have a used laptop that performs noticeably slower than any comparable devices, so I went ahead an downloaded BIOS ...
166
votes
10
answers
26k
views
How do you explain the necessity of "nuke it from orbit" to management and users?
When a machine has been infected with malware, most of us here immediately identify the appropriate action as "nuke it from orbit" - i.e. wipe the system and start over. Unfortunately, this is often ...
0
votes
1
answer
403
views
Rogue login to Google account after Windows clean install
Yesterday I downloaded a sketchy .exe on my Windows desktop and executed it. A command prompt window appeared then nothing abnormal happened. I tried running MalwareBytes but it didn't display any ...
1
vote
0
answers
60
views
GPU Firmware Infections through AUTOMATIC1111 (StableDiffuision)?
I would like to ask a question about a strange incident that occurred as a result of using the StableDiffusion tool AUTOMATIC1111 (https://github.com/AUTOMATIC1111/).
Here's what happened: I used the ...
1
vote
2
answers
182
views
How does malware work when compressed?
I have read up on compressed folders of file types such as .zip, .rar and .7zip being the malicious file itself (excluding cases such as an .exe file being disguised as a .zip file etc...), only ...
1
vote
1
answer
445
views
Is persistence via scheduled tasks possible if the user is not elevated?
As far as I can tell, scheduled tasks may only be created by those in the Administrators group by default. Does that mean that persistence can't be achieved via this method without gaining elevated ...
0
votes
1
answer
18k
views
Can my android phone get hacked if I share my hotspot?
I lent my mobile data to someone's computer and was not in the room while they were using it.
Suppose they wanted to gain control/access to my android device. How easy would it be? As far as I know, ...
1
vote
0
answers
31
views
what snort rules can detect covert channels?
I'm new to snort. I'm trying to set up rules in snort to detect the presence of covert timing channels. Ideally, I would like to use pre-made rules like the snort community rules.
So far, I've found ...
1
vote
2
answers
422
views
Is it possible to protect browser credentials from malicious processes?
What items should be considered to create a browser that prevents all access to stored credentials by a malicious process? Hardware attacks being out of scope.
Are there public projects addressing ...
2
votes
2
answers
167
views
Malware in neural networks
Lately, there has been discussion about malware hidden inside deep neural networks, such as, EvilModel: Hiding Malware Inside of Neural
Network Models (pdf).
I understand the hiding part, but I would ...