• paraphrand@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        11 hours ago

        And it was live on the CS code plugin store for under an hour. It’s impressive to ensnare the operators of the platforms (plural) in such a small window.

    • [object Object]@lemmy.ca
      link
      fedilink
      English
      arrow-up
      2
      ·
      14 hours ago

      For what it’s worth, we are living close to the movie Hackers, complete with turning tankers upside down and a new RCE/LPE a day lately.

      • etherphon@piefed.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        14 hours ago

        I suppose it’s just the culture that’s just kind of flat, I thought it would be more universal but everyone is in their own bubbles so it’s fractured all over the place, which is neat for the niches but there’s no glue.

  • A_norny_mousse@piefed.zip
    link
    fedilink
    English
    arrow-up
    7
    ·
    13 hours ago

    The way I’m reading the article, this is mostly a Github thing:

    The malware allows TeamPCP’s hackers to steal credentials (on github) that let them publish malicious versions of those software development tools, too (on github). The cycle repeats, and TeamPCP’s collection of breached networks grows.

  • Kiernian@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    1
    ·
    15 hours ago

    I wonder who made the list of “don’t touch these repos, they’re propping up our proprietary software sans attribution” for the LLM injectabots to avoid.

    I realize that the end game here is SUPPOSED to be “erode all trust in free software” but the ineptitude of those profiting off of proprietary software is such that they WILL fuck this up in such a way that it hurts themselves too, it’s just a matter of when.