this post was submitted on 19 Nov 2023
697 points (90.6% liked)

linuxmemes

21210 readers
105 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.

  • Please report posts and comments that break these rules!

    founded 1 year ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] Honytawk@lemmy.zip 128 points 11 months ago (4 children)

    https://en.wikipedia.org/wiki/Linux_malware

    I fucking hate the mentality that Linux is somehow completely safe.

    Just because it isn't attacked as much because of the low adoption rate among users, doesn't mean it has no vulnerabilities.

    [–] Clbull@lemmy.world 42 points 11 months ago* (last edited 11 months ago) (1 children)

    With SteamOS and ChromeOS now having millions of users, Linux attacks will become more commonplace.

    IIRC ChromeOS is either built on or can be configured to run applications like a Linux distro?

    [–] Honytawk@lemmy.zip 20 points 11 months ago

    Yes, so Linux better be ready, because those attacks will increase.

    And sentiments like the one from OP don't help one bit.

    [–] Ooops@kbin.social 30 points 11 months ago (2 children)

    Malware for desktop users is the low hanging fruit with little rewards. You just hear about it because it's so rediculous easy.

    The real money is on servers, so that's were real money/work is invested to develop malware for much higher gains. How successful are they again?

    [–] Gork@lemm.ee 13 points 11 months ago* (last edited 11 months ago)

    I think you're right. A single desktop, unless it is either someone in a position of power or access to trade secret files, is not a time effective attack vector.

    A server on the other hand can access all of that stuff across an entire organization.

    [–] Streetdog@sh.itjust.works 8 points 11 months ago (1 children)

    That's exactly why only the rich get scammed.

    [–] Ooops@kbin.social 1 points 11 months ago* (last edited 11 months ago)

    Of course not. There is a market for investing very little for some cheap malware and then putting it out there, waiting for the small amount of people (out of a billion of desptop users) falling for it. Also you go for the weakest link in defense, so scamming random desktop users is rarely a technical feat. It usually exploits the human, not the system.

    But we also all know how money is actually distributed. So millions of random users being scammed for some money is still not the high reward scenario a server is. Much more work is invested there because the rewards are so much higher. And yet even then you often target people as the weak link. System security for a company is mainly user security. Teaching them to not fall for for scams as an entry way to the system. And there are a lot of professionals that basically made this their own social science of how I convey those things the best, how I enforce and regularly refresh those lessons, how to make people stick to best practices.

    Are you trying to tell me this all happens in parallel to a technical server structure that actually isn't that safe but rarely exploited because nobody could be bothered to check for vulnerabilities as it's just Linux and the adoption rate is low?

    [–] jol@discuss.tchncs.de 12 points 11 months ago

    Not just that but whenever you hear that company xyz was hacked and their data leaked, what do you think was powering their servers? Most likely Linux. Sure, they usually have more things exposed to the internet, but users install way more apps so the attack surface is vastly bigger in home computers running Linux than servers.

    [–] banneryear1868@lemmy.world 7 points 11 months ago

    A lot of critical vulns are exploiting cross platform applications, log4j...