this post was submitted on 03 Aug 2023
100 points (83.8% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54577 readers
92 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
We are seeing on our corporate network lots of browser hikackers that connect to c&c and are used in botnet DDOS as a service. Once you install x software it sets up a persistent service that keeps modding chrome.exe etc
Firewalling the .exe that you installed does nothing to stop the calls to c&c
Fair point. Malware can tunnel through existing comms, thus firewalling the exe would do little to protect you.
That’s why I recommended a multilayered defense and practicing good opsec.
An exe that installs a service, modifies unrelated executables, and sends comms through an unrelated application would be a catastrophic failure in any good defense.
If your system is this wide open then you’ll be likely to have all sorts of problems from non pirated software. Such as freeware that installs adware.
I have tried to find these in the wild to no avail.
Unfortunately the machines that get infected are not fully controlled by us but they get networking and internet from us (space rental in the building), so we isolate them as much as possible and we black hole all the bad traffic on the router level.
Our machines all have EDR and strict security policies. Not much gets past that.
Right on. Gotcha.