this post was submitted on 27 Jun 2024
21 points (95.7% liked)

Cybersecurity

5404 readers
114 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] heeplr@feddit.de 5 points 2 months ago (1 children)

articles don't mention mitigation methods.

what to disable in thunderbird to not be vulnerable to "obfuscated JavaScript file that is sent to the victim through emails in archive files." and prevent that "The JavaScript file drops a self-copy at “C:\Users\<Username>” location with random names like “needlereportcreepy.bat”. The bat file is then executed"?

[–] Telorand@reddthat.com 4 points 2 months ago (1 children)

Best info I could find is from a previous blog post two links beyond the original article. "This updated version of malware delivered via JavaScript comes in archive files as attachments in emails."

So, don't open any weird attachments...? That's what I'm getting from it.

[–] user134450@sh.itjust.works 4 points 2 months ago (1 children)

It could be using the HTML email renderer. Best to disable HTML view for emails unless its a know good source.
View > Message Body As > Plain text

[–] Telorand@reddthat.com 3 points 2 months ago

Could be. Unfortunately, the folks who found this don't really go into enough detail about the attack's initial entry point.