• paraphrand@lemmy.world
        link
        fedilink
        English
        arrow-up
        11
        ·
        2 days ago

        And it was live on the CS code plugin store for under an hour. It’s impressive to ensnare the operators of the platforms (plural) in such a small window.

        • Buddahriffic@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 hours ago

          It’s because so much of corporate security is based on whether a user trusts a piece of code in an environment where they’ve gotten used to trusting new pieces of code. At my job, so many things ask for the one password that protects my full account that I wouldn’t be surprised if someone sneaks in something that both legitimately uses it to log in to something but also saves the user/pass combo and it would likely succeed completely at getting a bunch of credentials.

    • [object Object]@lemmy.ca
      link
      fedilink
      English
      arrow-up
      6
      ·
      2 days ago

      For what it’s worth, we are living close to the movie Hackers, complete with turning tankers upside down and a new RCE/LPE a day lately.

        • Thinker@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          1 day ago

          Local Privilege Escalation - i.e. someone who is already a non-admin user (whether through other hacks or normally) on your computer getting admin privileges.

      • etherphon@piefed.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 days ago

        I suppose it’s just the culture that’s just kind of flat, I thought it would be more universal but everyone is in their own bubbles so it’s fractured all over the place, which is neat for the niches but there’s no glue.

  • Kiernian@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    1
    ·
    2 days ago

    I wonder who made the list of “don’t touch these repos, they’re propping up our proprietary software sans attribution” for the LLM injectabots to avoid.

    I realize that the end game here is SUPPOSED to be “erode all trust in free software” but the ineptitude of those profiting off of proprietary software is such that they WILL fuck this up in such a way that it hurts themselves too, it’s just a matter of when.

  • A_norny_mousse@piefed.zip
    link
    fedilink
    English
    arrow-up
    11
    ·
    2 days ago

    The way I’m reading the article, this is mostly a Github thing:

    The malware allows TeamPCP’s hackers to steal credentials (on github) that let them publish malicious versions of those software development tools, too (on github). The cycle repeats, and TeamPCP’s collection of breached networks grows.