Very interesting approach
Fake ‘One Battle After Another’ torrent hides malware in subtitles
Submitted 2 days ago by cm0002@suppo.fi to cybersecurity@infosec.pub
Comments
asbestos@lemmy.world 2 days ago
altkey@lemmy.dbzer0.com 2 days ago
She said what now?
REDACTED@infosec.pub 2 days ago
We get it, you
vapeuse arch
chicken@lemmy.dbzer0.com 2 days ago
So wait, literally all it took was putting command line commands on their own line in a subtitles file? Am I interpreting this right
ticoombs@reddthat.com 2 days ago
No/yes. in a text file, there are commands to run, and then made a script to run those commands. They then make the script look like a “double click this to get it to work”. Nothing new
chicken@lemmy.dbzer0.com 2 days ago
oh, so it wasn’t a video player having an absurd exploit then
Mongostein@lemmy.ca 1 day ago
Why would you try to open a movie with .m2ts ??
someguy3@lemmy.world 2 days ago
…
RunJun@lemmy.dbzer0.com 2 days ago
Very interesting. Since I left windows, this isn’t an issue for me but I will be more aware that this can happen now.
FlexibleToast@lemmy.world 2 days ago
Kind of makes me want to install Clam AV just to watch for viruses I wouldn’t otherwise know about because I’m using Linux everywhere.
Decq@lemmy.world 1 day ago
There isn’t really anything new to learn here. It’s still the same old, don’t run an executable to watch a movie. That the code is partly hidden in the srt/jpg is just a minor implementation detail.