I downloaded a cracked install from tpb (haxnode). It was a loader exe that loaded the original exe and supposedly removed the drm in RAM. It required admin permissions, I didn’t trust it, but i ran in a vm and nothing happened.

Then i told myself “i have microsoft defender and windows firewall control, they will warn me” and I ran it in my main laptop, and still nothing happened. Like, literally nothing happened. The original program would not start. It would simply exit. Nothing. The other 6 almost identical torrents from the same uploader but with a different program version had a similar result. I gave up.

Then i reboot, and firstly i notice a couple DOS prompts flashing on the screen, and windows firewall control asking me if “aspnet_compiler.exe” is allowed to access the internet or not.

Suspicious, i go to check that “aspnet_compiler.exe” and it’s located in the .net system folder, i scan it with microsoft defender and it doesn’t report as a virus. I do not pay attention to the fact that it doesn’t have a valid Microsoft signature, and i tell myself “probably just a windows update” and i whitelist it on the firewall.

After a few hours I realize “wait a minute: it’s impossible that an official windows exe isn’t signed by microsoft!” I go back to scan it, not infected… or it looks like, defender says “ignored because in whitelist”. What? The “loader” put c:* in the whitelist!

The “crack loader” wasn’t a virus per se. It dropped an obfuscated batch in startup, which had a base64 encoded attachment of the actual malware, that was copied in the .net framework directory with unassuming names…

And this for a $60 perpetual license program that i should buy anyway because it’s for work

    • weirdo_from_space@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      49
      ·
      2 days ago

      Not for long, Linux will get targeted like this as it becomes more popular. It’s more of an argument for OpenBSD if anything, since OpenBSD will never be popular on desktop and it’s developers take security very seriously.

        • weirdo_from_space@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 day ago

          It took over twenty years just for Linux to enter the conversation at the enthusiast level, it took a lot, and I do mean a lot, of enshittification on Microsoft’s part and decades of campaigning by free software ideologues for us to get to this point, and if Windows still worked like Windows 7 we still wouldn’t be anywhere close.

          OpenBSD is super niche relative to FreeBSD, which is super niche relative to Linux. I don’t even know if it was built for desktop use, or if it happens to be usable as one thanks to Linux DEs being compatible so long as they don’t heavily depend on Linux specific stuff. Though I guess it can be a desktop OS in the most conservative sense of that term even without all that stuff.

      • NuXCOM_90Percent@lemmy.zip
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        1
        ·
        2 days ago

        There are two layers to this (actually a lot more but)

        What you are describing is mostly supply chain. It is the idea that the package manager’s inventory should be safe. And that is already a nigh impossible task simply because so many of the packages themselves can be compromised. It seems like every other year there is a story of bad actors infiltrating a project either as an attack or as a “research paper”. But the end result is you have core libraries that may be compromised.

        But the other side is what impacted OP and will still be an issue even if said supply chain is somehow 100% vetted. People are inherently going to need things that aren’t in a package manager. Sometimes that is for nefarious reasons and sometimes it is just because the project they are interested in isn’t at the point where it is using a massive build farm to deploy everywhere. Maybe it involves running blind scripts as root (don’t fucking do that… even though we all do at some point) and sometimes it involves questionable code.

        And THAT is a very much unsolved problem no matter what distro. Because, historically, you would run an anti-virus scan on that. How many people even know what solutions there are for linux? And how many have even a single nice thing to say about the ones that do?

    • fuckwit_mcbumcrumble@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      13
      arrow-down
      1
      ·
      2 days ago

      There’s no reason why Linux would be immune to this. If anything you’re probably not running any AV on Linux so if you did get infected you’d probably never notice until it starts being a pain.

      • RedSnt 👓♂️🧩 🧠 🖥️@feddit.dk
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        2 days ago

        I guess in theory you’re right. If you’re executing code, you’re executing code. But usually when executing EXE files it tends to target Windows machines, but yeah, there’s no way of telling if it’ll recognize it’s in a linux environment and do it’s thing there as well.
        Especially because OP mentioned he just clicked “Yes”/“Allow” to all the super user prompts.

        Now personally I don’t run an Arch system and only install software from my distro + flatpak; So I feel pretty secure for now. But I can see that trend buckling as the AUR is already under attack.

        • cmnybo@discuss.tchncs.de
          link
          fedilink
          English
          arrow-up
          7
          ·
          2 days ago

          Programs running on Wine still have access to all of the files that you do. They won’t be able to mess with system files unless they can find some sort of privilege escalation exploit in Wine though.

          • JustVik@lemmy.ml
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 day ago

            For a little more security in this case. You can run them from a separated dedicated user.