• Clbull@lemmy.world
      link
      fedilink
      arrow-up
      43
      ·
      edit-2
      1 year ago

      With SteamOS and ChromeOS now having millions of users, Linux attacks will become more commonplace.

      IIRC ChromeOS is either built on or can be configured to run applications like a Linux distro?

      • Honytawk@lemmy.zip
        link
        fedilink
        arrow-up
        21
        arrow-down
        1
        ·
        1 year ago

        Yes, so Linux better be ready, because those attacks will increase.

        And sentiments like the one from OP don’t help one bit.

    • Ooops@kbin.social
      link
      fedilink
      arrow-up
      32
      arrow-down
      3
      ·
      1 year ago

      Malware for desktop users is the low hanging fruit with little rewards. You just hear about it because it’s so rediculous easy.

      The real money is on servers, so that’s were real money/work is invested to develop malware for much higher gains. How successful are they again?

      • Gork@lemm.ee
        link
        fedilink
        arrow-up
        14
        ·
        edit-2
        1 year ago

        I think you’re right. A single desktop, unless it is either someone in a position of power or access to trade secret files, is not a time effective attack vector.

        A server on the other hand can access all of that stuff across an entire organization.

        • Ooops@kbin.social
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          1 year ago

          Of course not. There is a market for investing very little for some cheap malware and then putting it out there, waiting for the small amount of people (out of a billion of desptop users) falling for it. Also you go for the weakest link in defense, so scamming random desktop users is rarely a technical feat. It usually exploits the human, not the system.

          But we also all know how money is actually distributed. So millions of random users being scammed for some money is still not the high reward scenario a server is. Much more work is invested there because the rewards are so much higher. And yet even then you often target people as the weak link. System security for a company is mainly user security. Teaching them to not fall for for scams as an entry way to the system. And there are a lot of professionals that basically made this their own social science of how I convey those things the best, how I enforce and regularly refresh those lessons, how to make people stick to best practices.

          Are you trying to tell me this all happens in parallel to a technical server structure that actually isn’t that safe but rarely exploited because nobody could be bothered to check for vulnerabilities as it’s just Linux and the adoption rate is low?

    • jol@discuss.tchncs.de
      link
      fedilink
      arrow-up
      13
      arrow-down
      1
      ·
      1 year ago

      Not just that but whenever you hear that company xyz was hacked and their data leaked, what do you think was powering their servers? Most likely Linux. Sure, they usually have more things exposed to the internet, but users install way more apps so the attack surface is vastly bigger in home computers running Linux than servers.

        • Rustmilian@lemmy.world
          link
          fedilink
          English
          arrow-up
          32
          ·
          edit-2
          1 year ago

          Possibly, but Firefox & Chrome based browsers have the same built-in isolation and other security measures as on Windows. Plus you can use Ublock Origins to get rid of malvertisements. If you really wanted, you can also isolate the browser entirely with something like firejail.
          Hardend forks like LibreWolf are good too.
          Oh, and Wayland also isolates clients from each other too.

          I don’t think it’s that big of a threat as long as you keep some level of common sense.

      • AlexWIWA
        link
        fedilink
        English
        arrow-up
        12
        ·
        1 year ago

        There are a lot more ways to sneak malware into a system. Especially if some apps aren’t being maintained anymore. Linux is definitely safer, but you shouldn’t let your guard down

        • rockrelishpiealamode
          link
          fedilink
          arrow-up
          7
          ·
          1 year ago

          especially if you’re a developer. There are a lot of shenanigans going on with malware npm packages that prey on easy typos. I imagine it’s the same with other library installers for other languages too

          • AlexWIWA
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 year ago

            Funny you bring this up because it’s exactly what I was thinking of. A million small packages and dependencies and who knows if the repos got hijacked

      • Dizzy Devil Ducky@lemm.ee
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        2
        ·
        1 year ago

        Okay, what happens if your repo doesn’t have a specific software you are looking for? A trusted repo is good, but it won’t have everything you might want. This is especially true for new software or less popular software.

    • Baut [she/her] auf.@lemmy.blahaj.zone
      link
      fedilink
      arrow-up
      9
      ·
      1 year ago

      I don’t think that’s the correct path. There is a scanner already, called ClamAV, which works well enough.
      Virus scanners don’t fix the problem though. Android does it better: security by isolation and verification of system components.

    • CoderKat@lemm.ee
      link
      fedilink
      English
      arrow-up
      8
      ·
      1 year ago

      There’s already a ton of such exploits. Most servers use Linux and many exploits of corporations this had to go through Linux (though many exploits aren’t related to the OS at all – eg, SQL injection is OS independent). I expect it’s more common, though, that attacks on Linux systems are either meant to target servers or were personalized attacks that you’re not gonna accidentally download.

      On that vein, I also kinda suspect that many people who use Linux may be bigger targets for their employer than their personal PC. Which is actually scary, cause personalized attacks are far harder to defend against. I expect the average Linux user is technically savvy. Not a lot of money in try to do a standard, broad attack on such types (I think most attacks on personal computers are broad attempts that mostly depend on a small fraction of technologically incompetent people falling for simple schemes). But a personalized attack that happens to infiltrate a fortune 500 company? Now that’s worth a lot of money. Using Linux won’t protect you against those kinda attacks.

    • Clbull@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      edit-2
      1 year ago

      I’m surprised it hasn’t seen wider workplace adoption.

      A call centre I used to work in once scrapped all our Microsoft Office licences and installed OpenOffice on everyone’s workstations to cut costs. It was bad for the MI staff because they relied on Excel functionality that OO Calc simply didn’t have, but the vast majority of staff could get by on OpenOffice.

      My only real criticisms of how they handled this was not giving people any notice, and making us use a shitty webmail app that only booted in Internet Explorer and would sign you out after a minute of inactivity to access our work emails. They could have easily installed and configured Mozilla Thunderbird to give us some quality of life that Outlook once afforded us.

      Also this happened a few years after Oracle got their hands on OO, so not using LibreOffice was also questionable.

      But still. Think about the shitloads of money you’d save by using Linux in the office.

    • ShunkW@lemmy.world
      link
      fedilink
      arrow-up
      8
      arrow-down
      22
      ·
      1 year ago

      OSS is a double edged sword. It’s great, but the people looking for flaws that are exploitable are more often bad actors than good. At least that’s been my experience working in cyber security. Many CVEs that are responsibly disclosed are found to be actively exploited already.

      • Johanno@feddit.de
        link
        fedilink
        arrow-up
        40
        arrow-down
        2
        ·
        1 year ago

        The difference is the timing.

        Exploit found in closed source software:

        Probably years of usage by intelligence agencies and criminals until someone notices. (with no possible way to know for anyone that there even is a exploit). And even then it might take months for them to fix it.

        Exploit found in oss: Depending on the usage of the software several people are looking for security holes and they usually get fixed ASAP. Of course it is possible that there’s an exploit nobody finds and a criminal uses, but it is not more likely because he can read the code. If your code must be secret to be secure your code is anything but secure

        • Ooops@kbin.social
          link
          fedilink
          arrow-up
          5
          ·
          1 year ago

          Also there is no incentive for companies to fix an exploit quickly. They will only release the fix with some scheduled update anyway or else people might notice that there was something worth fixing and that’s bad for your stock price.

    • PixxlMan@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      edit-2
      1 year ago

      Have people tried running malware in Wine? Would be interesting to see how ‘well’ the malware would work.

      • Ooops@kbin.social
        link
        fedilink
        arrow-up
        11
        ·
        1 year ago

        The cruder the malware, the better your chances of running successfully in Wine.

        Because throwing together some simple executable using inbuild windows functions is much easier than programming something well-build and hidden based on deeper system layers. So your random “I just encrypted all your files because you clicked this .exe, now send me bitcoin to get it back”-bullshit might work well on wine (which is why wine should be run as it’s own user with no priviledges to access anything but your Windows programs).

    • Square Singer@feddit.de
      link
      fedilink
      arrow-up
      65
      arrow-down
      5
      ·
      1 year ago

      It was, 25 years ago. Same as Windows’ security was absent at that time.

      But people never update their prejudices, so all the jokes are from the last millenium.

      If you want an OS that is really malware-free, you need to run temple os.

      • ivanafterall@kbin.social
        link
        fedilink
        arrow-up
        34
        ·
        1 year ago

        If you want an OS that is really malware-free, you need to run temple os.

        Can’t get malware if the OS is the malware. jk. RIP you crazy genius SOB.

      • averagedrunk
        link
        fedilink
        arrow-up
        14
        arrow-down
        2
        ·
        1 year ago

        God wouldn’t let you get malware on his chosen OS.

      • psud@aussie.zone
        link
        fedilink
        arrow-up
        6
        ·
        1 year ago

        If you want an OS that is really malware-free, you need to run temple os.

        *anything unpopular

        • Square Singer@feddit.de
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          Well, anything unpopular that doesn’t use any software (even low-level software) that is also commonly used in popular environments. For example, game consoles, embedded devices or car entertainment systems often use outdated versions of popular browser engines. So to hack these, you don’t need to be a highly skilled hacker, you just need to be able to try some older vulnerabilities.

          And there are enough malicious websites that will just automatically check for these vulnerabilities. And then it’s enough to accidentally open one of these malicious websites and even though nobody wrote the hack specifically for your car, you might catch some malware regardless.

          • psud@aussie.zone
            link
            fedilink
            arrow-up
            1
            ·
            1 year ago

            For example, when GNU/Linux was unpopular, there was no malware for it; when it became the world’s favourite server software or became a valuable target

            • Square Singer@feddit.de
              link
              fedilink
              arrow-up
              1
              ·
              1 year ago

              True, but when it was unpopular it also didn’t use code/software that was commonly used on a more popular system.

    • seitanic@lemmy.sdf.org
      link
      fedilink
      arrow-up
      9
      arrow-down
      4
      ·
      1 year ago

      I’ve been using Linux for almost 20 years, and AFAIK in all that time I’ve never encountered a Linux virus. OTOH when I run Windows, I hit a virus within the first six months.

      • R0cket_M00se@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        2
        ·
        1 year ago

        Sounds like you have bad habits, I’ve had windows for years and no problems. Just scan with Defender after a download, occasional Malwarebytes scans to make sure, and you’re pretty safe.

        Most viruses are written for windows but that doesn’t mean you’re just instantly safe. You can bet as Linux grows they’ll see far more.

        • AlexWIWA
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 year ago

          Yeah last time I had a windows virus was because I got a bad Photoshop crack. But the virus was just a coin miner. Before that, I hadn’t had a virus in 13 years.

            • AlexWIWA
              link
              fedilink
              English
              arrow-up
              5
              ·
              1 year ago

              Creative cloud is malware in my opinion

            • jayands@lemmy.world
              link
              fedilink
              arrow-up
              2
              ·
              edit-2
              1 year ago

              The Win10 iso that I definitely legitimately purchased has a ppApps folder that has Photoshop in it; I’ve always just assumed I would be able to delete it from there.

              If you don’t have it portable-ized, though, Revo Uninstaller might help. (though I never used it for long enough for the trial to run out, so I don’t know how much it costs)

              • Honytawk@lemmy.zip
                link
                fedilink
                arrow-up
                2
                ·
                1 year ago

                Revo Uninstaller has a free version.

                Never paid for it, yet have been using it for decades.

    • platypus_plumba@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      1 year ago

      — When the Indian Amazon support guy sees you’re a junior on your first week and tells you to execute a script to install a software for a video call with him. And you do, but it needs sudo access, so you give it…

      — You have sudo power here

      Sadly, true story. I never told anyone. My neurons clicked a day after that and I removed everything from the computer. It was too late, they hacked some things but IT just laughed and recovered some backups. They never knew I was the virus all along.

      Good times.

  • ShinyRanger@iusearchlinux.fyi
    link
    fedilink
    arrow-up
    30
    ·
    1 year ago

    You guys are quick to forget that Wine (Wine Is Not an Emulator) is, in fact, not an emulator. Most windows ransomware will successfully encrypt your files if ran with wine.

  • Gork@lemm.ee
    link
    fedilink
    arrow-up
    29
    ·
    1 year ago

    If you’re feeling even more paranoid, go with something even more obscure like Plan 9 from Bell Labs. It’s Unix-like but differs so much from it that a Unix or Linux type malware would do nothing to it.

    • Laser@feddit.de
      link
      fedilink
      arrow-up
      14
      ·
      1 year ago

      I always want to try Plan 9 or one of its successors but actually never do. So many interesting concepts but nothing really to apply them to.

        • Laser@feddit.de
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          It’s a good question what I really want. I’m very satisfied with my current system (NixOS) but in the end it’s still Linux and stuff like the 9P filesystem just intrigues me. So it’s not like I’d need to switch or anything. But a playground to apply the concepts to some problems would be nice. Maybe I’ll try 9front some day and see what I can do with it

          • Gork@lemm.ee
            link
            fedilink
            arrow-up
            2
            ·
            edit-2
            1 year ago

            Indeed. A fun little project but unfortunately it doesn’t seem ready for any sort of daily use. Driver support (a crucial component) is probably pretty scarce. Their web browsers too are hit-or-miss, with one in particular (Links) that crashes when performing a during Google search.

            Still, there are few alternatives that differ substantially from the original ancestral Unix that are available and more should be developed. GNU/Hurd and the BSD’s are the only ones I know of.

      • Gork@lemm.ee
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        1 year ago

        Mmm too modern for my tastes. Gotta go with the Lyons Electronic Office LEO I OS from 1951.

        It would need punch card malware lol.

        Ooh let’s go back even further to ENIAC in 1945.

        • banneryear1868@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          It’s nice you could just solder in new components.

          Tru64 and SunOS are furthest I go back I think, Commodore KERNAL/BASIC technically.

          Obscure OS you could actually run today could be Solaris…

  • recapitated@lemmy.world
    link
    fedilink
    arrow-up
    19
    ·
    1 year ago

    False sense of security. You accidentally downloaded a virus that doesn’t work on your system… What kind of habits and hygiene are you rolling with on a day to day basis?

  • Björn Tantau@swg-empire.de
    link
    fedilink
    arrow-up
    18
    arrow-down
    4
    ·
    1 year ago

    Downloading a virus has as much effect on Windows as it does on Linux and any other operating system: None.

    Unless it exploits a security vulnerability with something that automatically touches the file. Like a virus scanner.

  • lemmesay@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    2
    ·
    1 year ago

    so, I had a pendrive that a friend borrowed once. later on another friend used it and said it had virus. I simply couldn’t know since I was on GNU/Linux.

    though later on I cleaned it with dd.

    • valkyre09@lemmy.world
      link
      fedilink
      arrow-up
      8
      arrow-down
      1
      ·
      1 year ago

      I work service desk. This right here is the reason I tell Mac users they need to keep the AV on.