this post was submitted on 11 Dec 2025
9 points (90.9% liked)

cybersecurity

5261 readers
25 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
top 4 comments
sorted by: hot top controversial new old
[–] tal@lemmy.today 1 points 1 hour ago* (last edited 1 hour ago)

The malware continuously monitors its access to GitHub (for exfiltration) and npm (for propagation). If an infected system loses access to both channels simultaneously, it triggers immediate data destruction on the compromised machine. On Windows, it attempts to delete all user files and overwrite disk sectors. On Unix systems, it uses shred to overwrite files before deletion, making recovery nearly impossible.

shred is intended to overwrite the actual on-disk contents by overwriting data in the file prior to unlinking the files. However, shred isn't as effective on journalled filesystems, because writing in this fashion doesn't overwrite the contents on-disk like this. Normally, ext3, ext4, and btrfs are journalled. Most people are not running ext2 in 2025, save maybe on their /boot partition, if they have that as a separate partition.

[–] ThatGuyNamedZeus@feddit.org 4 points 5 hours ago (1 children)

Cool! Now consider all the others they haven't found yet

[–] Skullgrid@lemmy.world 2 points 3 hours ago (1 children)

the ones that scare me are apt and pacman and the others

[–] redsand@lemmy.dbzer0.com 1 points 27 minutes ago

Those aren't insane to audit. It's the libraries everyone uses