To be fair, if it was actually malware it could easily have done it hidden and in the background with no need for it to open cmd
it opens automatically for programs without guis that forget to set the “please don’t show cmd” flag. i made a program for my grandmother to automatically sort her photos and it would always flicker that damn window because i couldn’t figure out how to set the flag from Go :(
Now, that’s sweet
go build "-ldflags -H=windowsgui"
Or do you mean withexec
?that is what i used but i could not get it to work, possibly because the program did not have a gui either. it was just supposed to be a “button” in the file explorer.
Huh, strange. That sounds really annoying if every time I press a button a terminal flashes on screen.
for a poweruser yeah but this is my grandmother we’re talking about. she only used the program once every six months, when her camera ran out of space and she emptied it onto the computer.
Malware installation tool crashed, because call not supported in Wine. Good.
Important: https://wiki.archlinux.org/title/Wine#Prevent_Wine_from_creating_filetype_associations
They should really create a simple cli switch for that.
I have many non pirated games that do that, too.
I hope WINEPREFIX is thick enough for a condom.
Now say it with me, WINE IS MALWARE COMPATIBLE
Run wine with sudo. Yolo
Not if I don’t give it access to my Linux files
Not exactly true but for simple malware yeah
There’s a Bubblewrap wrapper for wine: https://github.com/hartwork/sandwine
Windows applications can still access the Linux functionality when running under Wine, though of course that has to have been purposefully coded in.
However you can run wine itself inside something like firejail to properly sandbox the whole thing - I have Lutris in my Linux gaming machine configured to do just that for all games by default (my firejail config even blocks networking).
How do you configure that by default?
There is a launch configuration option under each game (under System Options tabs, if I’m not mistaken) called “command prefix” were you can put the firejail stuff (so if you put just “firejail -someoption” there your game gets launched with, for example “firejail -someoption wine …”) or whatever other sandboxing command you want to use (such as bubblewrap).
In the main Lutris options, there’s a section with the default values for all those launch options for games, so if you put it in the “command prefix” there, all games get launched with that command prefix unless you override it in that game’s launch options (so, for example, if you’re blocking networking for all games but want to run a game for multiplayer over the net, you override the sandboxing wrapper options in that game’s launch options specifically, which won’t affect any other game).
I think wine maps at least your home directory into prefix, so your data would be in danger.
yup, home (or was it root actually?) is commonly mapped to the Z: drive, and it’s writeable too. Wine isn’t meant to be a security layer.
Wine, in Bottles, in Flatpak. Worst IKEA experience I’ve had.
is that some kind of newfangled swedish fetish?
I dont pirate games, and I see them sneaky command windows opening and closing a bit. Mainly on startup
Same, on Windows 11. Not sure what causes it. Someone should make a utility that logs every time a cmd window was opened.
Thats why you virtualize. I have a program that I must use from time to time because of legacy issues, and much content in their propietary format. The solution was either pay out the wazoo for accesing my own content a few times a month, or arrr it. A download, and a VM does the trick. And bonus, I can use it in Linux, too.
The fuck should I care? I already installed Windows entirely with informed consent.
The fact they are collecting telemetrics and are constantly monitoring them. My laptop sped up considerably when I debloated Windows.
That’s my point. If I’m already cool with Windows, what should I care about other, lesser, malware?
Amd over clocking tool thing does that and I hate it
My windows is installed on separate ssd and snapshotted regularly, opening browser on windows without ad blocker probably is more dangerous.
Unless you have the other SSDs physically disconnected, you’re still running the risk of having your other installations affected by ransomware.
Probably, yeah, but I have exported snapshots and backups for such cases, and data itself is encrypted. So at worst a few hours lost. They can be easily disconnected i just never actually do it.
Many malicious actors don’t trigger their payload that you would notice until after data has been mined.
I’ve visited businesses to help put together basic infrastructure after their systems were encrypted and ransomed. We would bring up a backup from the night before only to find the system still infected. We would go back a week, 2 weeks, a month.
These things lie in wait and only as the final nuclear option do they get noticed.
Kind of not a problem? If malware in question would try to write itself onto other drives it needs to know my luks pin and support my fs, so at worst it can try and fail. If it’s a windows machine that has it, well I’ll just nuke it after firat reoccurence. Realistically, I’ve had this setup for over a decade and there were 3-5 times when pirated game had malware.
What’s stopping the malware just blowing the disks away? You keep backups disconnected right?
Yes, backups are on multiple separate devices, that are both online and offline.
It would still need ti be an immutable install
Same, I just threw windows on a 1tb ssd and it does nothing but play pirated games. Go ahead and collect what you want lol
yeah, that’s all good until your pwned pirate PC roots your router and printer and baby monitor, and your LAN becomes a DDoS source.
Jokes on u I can’t afford internet
Why would I connect it to the Internet?
How are you downloading the games
Windows is a second ssd specifically for the purpose of playing the games, I just download them on Linux to that SSD and switch over to play it
So they’re still both plugged in at the same time, right?
Lol Windows
- Replace with a shell window
Malware would explicitly have to be executing a terminal for a window to popup. They can just call a shell directly.
Ah yes, for windows to suck, Linux would have to be invulnerable to any issue
Fortunately, ours is a world in which virustotal.com exists.