• cmnybo@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    28
    ·
    5 hours ago

    It seems like they could be rendered ineffective by simply disabling auto run and forcing removable drives to mount noexec.

    • Majestic@lemmy.ml
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 hours ago

      Well it’s believed it entices users to click the malware to run by disguising itself as the last accessed folder with the same name and folder icon.

      In that case having the option to always show extensions enabled would be helpful for trained users who care to be careful.

      It’s not that interesting sounding given we know the NSA and eyes countries have developed compromised firmware for certain hard drives to enable true spread without interaction or hope of prevention. Whenever I see one of these I wonder if it’ll be a case of compromising the device itself but it’s this old stuff instead which can be defeated with a good security posture.

      • cmnybo@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 hours ago

        When the drive is mounted noexec it’s not possible to run any programs on it. You can also mount any user writable directories noexec so they can’t copy the program somewhere else and run it.

      • Chronographs@lemmy.zip
        link
        fedilink
        English
        arrow-up
        6
        ·
        3 hours ago

        Hidden file extensions is such a terrible default it amazes me that Microsoft is still doing that