• Retiring@lemmy.ml
    link
    fedilink
    arrow-up
    68
    arrow-down
    2
    ·
    11 months ago

    If you run random .pdf.something-files pm‘d to you on LinkedIn you probably shouldn’t use a computer anyway, no matter if it runs Linux or Windows…

    • OsrsNeedsF2P@lemmy.ml
      link
      fedilink
      arrow-up
      32
      ·
      11 months ago

      Lazarus’ Operation DreamJob, also known as Nukesped, is an ongoing operation targeting people who work in software or DeFi platforms with fake job offers on LinkedIn or other social media and communication platforms.

      Looks like they’re going after desperate job seeking crypto bros. Even if it’s not terribly effective, it’s a spray and pray, so they probably got some people.

      • brick@lemm.ee
        link
        fedilink
        arrow-up
        19
        ·
        11 months ago

        Seems to me like they are targeting people who likely have access to assets that can be easily stolen and hard to track.

      • ffhein@lemmy.world
        link
        fedilink
        arrow-up
        9
        ·
        11 months ago

        I work for a large IT company so we’ve had numerous such training courses, but then they use third party services for time reporting, manager evaluation, cloud services, personal finance advice, etc. so I regularly get emails with links to domains that I’ve never heard about that I’m supposed to trust…

        • Quereller@lemmy.one
          link
          fedilink
          arrow-up
          7
          ·
          11 months ago

          I work in a big international company. We regularly have phishing (email) awareness training. But they outsource about everything and regularly change the providers. So we often get totally legit emails from just some random companies and are supposed to visit/ login to some previously unknown domains.

    • leopold@lemmy.kde.social
      link
      fedilink
      English
      arrow-up
      30
      arrow-down
      1
      ·
      11 months ago

      It never occurred to me before reading this comment that there actually is a use case for the execute permission. To me it was always just this annoying thing I have to do whenever I download an executable which I didn’t have to do on Windows.

  • iAvicenna@lemmy.world
    link
    fedilink
    arrow-up
    25
    arrow-down
    1
    ·
    11 months ago

    how someone working on software and tech opens a file called “HSBC job offer.pdf.zip” is beyond me…

  • BlanK0@lemmy.ml
    link
    fedilink
    arrow-up
    12
    arrow-down
    1
    ·
    edit-2
    11 months ago

    Still the exploit is easier to avoid compared to windows viruses and stuff. Even with the linux popularity increasing there is already out there good solutions to prevent this kinda stuff like have SELinux installed, use firejail to run suspicious files, use proxies to visit weird sites (you can use proxychains + tor, a bit overkill but works if you don’t have a local proxy), etc.

    Not to mention that one of the attack vectors of this exploit requires using a systemd feature which is the sysnetd which isnt going to work on other init systems. Reason why a lot of times minimalism can be superior to just having all the features + unnecessary ones out of the box.