View Single Post
Old 07-29-2024, 09:13 PM   #16
ownedbycats
Custom User Title
ownedbycats ought to be getting tired of karma fortunes by now.ownedbycats ought to be getting tired of karma fortunes by now.ownedbycats ought to be getting tired of karma fortunes by now.ownedbycats ought to be getting tired of karma fortunes by now.ownedbycats ought to be getting tired of karma fortunes by now.ownedbycats ought to be getting tired of karma fortunes by now.ownedbycats ought to be getting tired of karma fortunes by now.ownedbycats ought to be getting tired of karma fortunes by now.ownedbycats ought to be getting tired of karma fortunes by now.ownedbycats ought to be getting tired of karma fortunes by now.ownedbycats ought to be getting tired of karma fortunes by now.
 
ownedbycats's Avatar
 
Posts: 11,111
Karma: 77213681
Join Date: Oct 2018
Location: Canada
Device: Kobo Libra H2O, formerly Aura HD
Quote:
Originally Posted by jackm8 View Post
I don't think that it's about rar files at all. If I read this right, there's a shortcut that looks like a book file (kamasutra.epub.exe), that then installs this trojan.
Quote:
Originally Posted by DiapDealer View Post
How does kamasutra.epub.exe look like a book file? Surely even the most novice potential book thief knows that ebooks aren't executables.
People aren't opening kamasutra.epub.exe, they're opening kamasutra.rar and extracting it not knowing that it also extracts hidden malware. The user opens the shortcut thinking it's the book but instead it goes to the hidden malware.

The unacev2.dll vulnerability was also used tp extract hidden malware, except it was able to sneak it directly into the Windows startup folder.

Last edited by ownedbycats; 07-29-2024 at 09:42 PM.
ownedbycats is offline   Reply With Quote