Super, heute abend möglich meierstraße 123
doesn't pick up and never answers again
Super, heute abend möglich meierstraße 123
doesn't pick up and never answers again
1 euro gib oder nimm
Lemmy about to be obliterated
Scheiße :(
Knowing German can give you a competitive edge with employers and even boost your salary prospects.
Wo mein geld?
This article seems to be targeted at brits but nevertheless, learning languages is good for many reasons. It's also fun as long as it's not something that happens under pressure.
Leider nicht :( maybe they introduce it soon since postkorb also has english now!
Thankfully I have my partner who can help me though :)
(Hoffentlich Englisch ist ok. Mein Deutsch ist noch nicht so gut)
The new app is nice. I do feel like my feedback went to deaf ears though :( I sent feedback long time ago wishing that they'd make the text in the app selectable (since I understand that it's easier than to provide other languages) so I could translate e.g. the text that was saying "you have to sign to switch Digitales Amt to ID-Austria" above the "sign now" button.
But yeah, it's okay. Hopefully next enhancement is that Mein Postkorb can be opened inside the app instead of the browser 🍾
Bonjour Lampes
Installed and in daily use! Thanks comaps team ❤️
What the hell
Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.
"At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work."
Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server ("firewall[.]tel").
This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain ("cdn.audiowave[.]org") and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB ("i.ibb[.]co").
"[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL."
Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user.
The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT malware.
Honestly, at this point the hacker deserves to empty my bank account.
Edit: honestly I don't know how to answer this in german, haven't learned how to express my condolences.