Wednesday, November 13, 2019

The Jesus Ransomware


No, seriously... someone's working on it. The file extension is .jc

While the article said this much, it didn't mention what it did after it infected the computer.

Let me guess... it puts ten rules onscreen....

  1. Thou shalt have no other processors before me
  2. Thou shalt not covet thy neighbor's RAM
  3. Thou shalt not not lay with Macs
  4. In order to decripteth, thou shalt require 17 bitcoins and the Holy Hand Grenade of Antioch
  5. Thou shalt not overclock, unlessith thou cooleth properly
  6. Thou shalt not take the name of Linus Torvalds in vain
  7. Remember Black Friday sales, and keep them holy
  8. Thou shalt not steal CPU cycles for pictures of kitties
  9. Honor thy processors that came before
  10. If thou art bored, thou can get in some coveting of thy neighbor's wife's ass

Infection vector: clicking on a link in an email from A. Priest.

Damage: adds .jc extension to all the new little files, marks files Saved.

Repair: when repair is threatened, ransomware moves the infection to a different computer, in a different country; pretends nothing happened.




Oopsie - Faceyspaces did it again.
A bug in the app accesses the iPhone's camera while the user scrolls through News Feed.

Reached for comment, Faceyspaces confirmed the bug was "inadvertently introduced" and promised a fix was in the works.

"Inadvertently introduced" - the same way impeachment was inadvertently introduced.




  • An oopherectomy is getting rid of ovaries. An uberectomy is getting rid of a car service that will either rape or kill you.




Bad Intel drivers give hackers a backdoor to the Windows kernel.
Patch yer damn computers.


As if it weren't enough that Google is after every possible piece of information it can get, it just went into healthcare. As if healthcare wasn't enough, it's now in banking, via checking accounts. Early next year, it will start monitoring air and change its name to Cyberdyne Systems. In response to the rapid growth, Google has decided to drop its privacy policy, beacause.. you know... Google.




How about a video on a DDOS attack?
Warning: don't click the link if you aren't interested.



I just get done mentioning the PinePhone, and here's an article, with it running KDE's OS.  This is Big News<tm>. No Google. No Apple. Open source hardware and the linux phone platform you choose. I'm going to wait for the next generation, which will hopefully have more horsepower. Or maybe I won't....



McAfee Antivirus lets hackers execute arbitrary code and escalate system privilege.  It was patched, but make sure your system is ok and that it was patched.


Newer Intel CPUs vulnerable to variant 2 of ZombieLoad attack.
Just in case your CPU wasn't vulnerable to the first version, here's your attack.
Here's further info on MDS, the hardware vulnerability.
These guys found the initial processor loophole.
These guys find themselves too busy singing to deal with vulnerabilities.



And because you just haven't had enough of today's shit show of vulnerabilities, your Trusted Platform Module may leak your VPN server's private key.




Aside from that, it was a pretty good day.



No comments:

Post a Comment

Corona Malware

This blog has been suspended for a bit because it's practicing social distancing. Or no one reads it. Or I'm too lazy. Or the str...