• zante
    link
    fedilink
    English
    arrow-up
    37
    ·
    5 hours ago

    No mention of transmission methods as far as I understand the article

    • Buffalox@lemmy.world
      link
      fedilink
      English
      arrow-up
      42
      arrow-down
      2
      ·
      5 hours ago

      The whole thing sounds fishy. Like it’s trying to convince people Linux is inherently vulnerable.

      exploiting more than 20,000 common misconfigurations

      Like WTF?

      • Buelldozer@lemmy.today
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        edit-2
        1 hour ago

        Like it’s trying to convince people Linux is inherently vulnerable.

        I’m typing this reply from a machine running KDE Plasma on top of Linux Mint 22.

        I’m not sure what precisely what you mean by “inherently” but I’d like to point that “Linux” has security problems all over the place; the kernel has issues, the DEs have issues, the applications have issues. It’s more secure than Windows but that’s not a very high bar.

      • nyan@lemmy.cafe
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 hours ago

        It’s kind of an iffy assertion. That’s maybe the number of files it scans looking for misconfigurations it can exploit, but I’d bet there’s a lot of overlap in the potential contents of those files (either because of cascading configurations, or because they’re looking for the same file in slightly different places to mitigate distro differences). So the number of possible exploits is likely far fewer.

    • JohnnyCanuck@lemmy.ca
      link
      fedilink
      English
      arrow-up
      10
      ·
      5 hours ago

      They have an “attack flow” diagram that seems to indicate a hacker installing it directly through a known vulnerability.