More than a hundred backdoored malware repos traced to single GitHub user (news.sophos.com)
from Gsus4@mander.xyz to technology@lemmy.world on 05 Jun 21:03
https://mander.xyz/post/31475852

#technology

threaded - newest

JustARegularNerd@lemmy.dbzer0.com on 05 Jun 22:04 collapse

Well that’s certainly no light read - I’ll admit that I’ve only read the first six sections of the document for now

The crux of it that I could see was the initial repo that was backdoored contained a malicious Windows command in the PreBuildCommand field of .vbproj file

My initial thoughts would be that it might be advisable for build tools to confirm any defined build commands with the user when it detects a command not seen before?

I suppose otherwise the argument could be made that if you’re downloading and compiling code that is backdoored, if you’re not checking .vbproj or equivalents, you’re probably also not auditing any source code either and you’re being pwned either way.

tal@lemmy.today on 05 Jun 22:33 collapse

A lot of malware-adjacent stuff, like exploit demonstration code, has contained its own malware targeting the user. Probably best to run stuff like that in a container or VM.

JustARegularNerd@lemmy.dbzer0.com on 05 Jun 23:12 collapse

Agreed - the end of the article does state compiling untrusted repos is effectively the same as running an untrusted executable, and you should treat it with the same caution (especially if its malware or gaming cheat adjacent)