this post was submitted on 04 Sep 2025
59 points (96.8% liked)
Linux
9303 readers
307 users here now
A community for everything relating to the GNU/Linux operating system (except the memes!)
Also, check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
There are a lot of ways that the attacker could persist... maybe try a different distro, just to see if it stops? What did you redownload/install when you did your wipe? Do you have any computers on the network besides yours?
Obviously worst case for 'persisting' would be your hardware. Do you have a friend who can plug in or connect to your internet and see if they get the same blocked requests? Maybe try a different router/modem.
QubesOS is looking mighty nice, if only I wasn't a gamer and had another GPU to dedicate to the VM's/qubes (dom0 is the baseline qube/VM, and it hijacks the GPU for itself).
I redownloaded Debian Bookworm and checked the hash, it validated. So I reinstalled with that iso from the official website.
I swapped hardware, figuring it stemmed from a SecureBoot Key ransom against MSI not too long ago. So I swapped out an MSI X570s Edge Max mobo for an Asus ROG Crosshair VIII Dark Hero. Issues came back.
There's the https://en.wikipedia.org/wiki/Sinkclose vulnerability which afaiu could compromise the CPU itself. Haven't heard about it being actually exploited, but who knows.
Yea, if you swapped the hardware...