• 2 Posts
  • 24 Comments
Joined 3 years ago
cake
Cake day: December 20th, 2021

help-circle



  • I can see that you’ve taken on a lot of the feedback from previous comments threads. This is great! Thank you.

    And thank you for open sourcing it.

    Question: I was using Quiblr before without logging in. If I sign up an account now and log in, will it transfer my locally stored data into the account to keep the recommendation (see more/see less) settings?






  • Their post is specifically about Populous: The Beginning which came out in 1998 and was the first Populous game to use 3D graphics. It has quite different mechanics than the original Populous games, and you can see the DNA of Black & White emerging, with the concept of having a leader character that has an important role in the gameplay.






  • Why not post your blogs to a fediverse platform? Do they need to be on a separate hosted system? You’ll probably get more people reading and engaging with your posts if you are just posting to a Mastodon instance rather than hosting on a separate web platform and hoping that people stumble across it.






  • The Kaspersky analysis noted that the malware contained comments in the shell scripts written in Ukrainian and Russian, and used malware components detected in previous malware campaigns since 2013 that presumably have been attributed to a specific group.

    FTA:

    Meanwhile, the postinst script contains comments in Russian and Ukrainian, including information about improvements made to the malware, as well as activist statements. They mention the dates 20200126 (January 26, 2020) and 20200127 (January 27, 2020).

    Having established how the infected Free Download Manager package was distributed, we decided to check whether the implants discovered over the course of our research have code overlaps with other malware samples. It turned out that the crond backdoor represents a modified version of a backdoor called Bew. Kaspersky security solutions for Linux have been detecting its variants since 2013.

    The Bew backdoor has been analyzed multiple times, and one of its first descriptions was published in 2014. Additionally, in 2017, CERN posted information about the BusyWinman campaign that involved usage of Bew. According to CERN, Bew infections were carried out through drive-by downloads.

    As for the stealer, its early version was described by Yoroi in 2019. It was used after exploitation of a vulnerability in the Exim mail server.