• @_bug0ut
    link
    5
    edit-2
    10 months ago

    I’m not sure where I said anything about the reason any of those platforms get viruses because you’re right, Windows was often more targeted because its footprint was massive by comparison (whole lotta end users out there, but also tons of domain controllers and enterprise systems running it) - I’m not arguing that.

    AMOS itself is distributed in all kinds of ways including phishing, being bundled into crap no-name software, shady ads, tainted torrents, whatever. You still have to be tricked into downloading whatever it is that infects your machine with it.

    As to this partially being Google’s fault, from the article itself:

    The ads are legitimate and paid for but disguise themselves as the website or software the user is searching for.

    In the given example, it sounds like the ad was for Trading View, a pretty popular stock market charting platform, but the ad itself took users to trabingviews.com and it looked like a clone or Trading View’s site or some kind of landing page that purported to be a download for a desktop client. In the Malwarebytes article I share below, the fake URL purporting to be Trading View’s website is actually tradingsview.com

    I’m not exactly sure where you’re getting the idea that this was a fake ad caused by malware pre-existing. These are “legit” Google ads that are bought and paid for and not quality checked by Google before they display them.

    Here’s the article directly from Malwarebytes, the folks who kindly did the write up the author of the above article is talking about:

    https://www.malwarebytes.com/blog/threat-intelligence/2023/09/atomic-macos-stealer-delivered-via-malvertising

    • @[email protected]
      link
      fedilink
      English
      -1110 months ago

      I think your should read again. You seemed to understand the parts separately but when they came together you got a bit confused

      • @_bug0ut
        link
        8
        edit-2
        10 months ago

        My guy, I don’t know what you want from me. A Google ad is purchased in a legitimate manner, but the ad itself actually links to a page where you download malware.

        You answered really fast, so you clearly didn’t read the actual source material I linked at the bottom - specifically the Distribution section.

        • @[email protected]
          link
          fedilink
          English
          -1110 months ago

          It was already explained in the original article. It’s not what you want to believe but it is the actual situation and I’m not gonna spend forever writing a response because it won’t actually change the fact of you reading things

          • @_bug0ut
            link
            7
            edit-2
            10 months ago

            The “original” article is the one I linked - the one written by the actual security researchers at MalwareBytes who did the research on this malware and then provided the detailed write up (which is what security researchers do). The one shared in the OP is referencing that article.

            But it’s all good. All you had to do was tell me you can’t read and I would’ve backed out of this thread like 2 responses ago. :) Have a great night!

            • @[email protected]
              link
              fedilink
              English
              -510 months ago

              I mean, at the end of the day the malware is being allowed to install on the computer is it not?

              • @_bug0ut
                link
                310 months ago

                Explicitly by the users negligence, same as any negligent user installing some freeware on windows and ending up with BonziBuddy and 34 search bars in their browser. Or alternately, by clicking “Ignore” on on an alert in their AV and proceeding with the installation anyway.

                • @[email protected]
                  link
                  fedilink
                  English
                  -310 months ago

                  Sure but actually no as that literally wouldn’t be able to happen on windows. Windows will immediately quarantine any flagged files and they won’t be able to launch without the user having to jump through some rather extravagant hoops. Since you mentioned bonzibuddy and search bars I’m gonna go ahead and assume you haven’t looked at a Windows PC in the last 15 or more years so I guess that would explain your misunderstanding on this subject

                  • @_bug0ut
                    link
                    2
                    edit-2
                    10 months ago

                    My main PC is a windows PC (mainly for video games and music production). I also have a Macbook for my work as a (currently) Lead Systems Automation Engineer for a large global company (14 years in the industry, 3.5 of those was me “taking a break” and going into Infosec specifically to first do endpoint/end-user security, then moving into container and cloud security) a personal Macbook, as well as a few Linux laptops I use to write code and do other tech-related things because I prefer MacOS and Linux for that kind of work. I’m well-exposed to most operating systems and have a working knowledge of how security works, both in a professional setting as well as a personal one.

                    I mention BonziBuddy and search bars because they’re funny and to illustrate a simple point. The reality is that browser hijackers still very much exist (though they’re not as prevalent as they used to be because browsers themselves have become more resilient over the years - nowadays, they’re usually found in add-ons/extensions because its easier to fly under the radar that way).

                    For all the shady shit I’ve done on all of the above platforms, I’ve never had an issue. Specifically in Windows, Defender - which is still the de facto/standard security tool that comes bundled with Windows under the Windows Security tool suite - has not once flagged malware for me. I’ve found it with Avast and BitDefender, but Windows Defender simply isn’t great for the things I do.

                    I also run ClamAV on the Macbook for ad-hoc scanning of things I download prior to running them. Why? Because I’m not a negligent user and I do at least the bare minimum in regards to good security practices.

                    In every one of the above cases/operating systems/platforms, there is always some kind of security tooling or framework involved (whether that’s ClamAV on Mac, BitDefender or ClamAV or MalwareBytes or whatever on Windows, SELinux or AppArmor or ClamAV on Linux) that can and should be leveraged if you really want to be “safe.”

                    In the case of AMOS and Macs, users are purposely bypassing Gatekeeper and proceeding without knowing wtf they’re installing. As soon as Gatekeeper pops up like that, you should be on alert unless you know the software you’re installing isn’t signed, trust the source, and are willing to codesign it yourself.

                    You, on the other hand, clearly seem to have some kind of gripe against Macs (based off of your comments in this now far-too-long comment thread) and that kind of weird quasi-religious brand loyalty (or hatred) is a thing I’ll never understand.

                    The fact that you’re out on a public forum, spewing bad info/misinformation really says everything. Not that you care, but I’d have respected you more if you just admitted you were wrong and misread the bit about the Google ads. Instead, you decided to be confidently dumb and jump from hill to hill, prepared to die on each one of them.