Kailn

joined 5 months ago
[–] Kailn@lemmy.myserv.one 4 points 1 week ago

Peviously posted on an another lemmy community.

 
  • The Chocolate Factory announced the Google Threat Intelligence Group-led actions on Wednesday and said that, in partnership with other teams, it terminated all Google Cloud Projects that had been controlled by UNC2814, a group that GTIG has tracked since 2017. They also disabled all known UNC2814 infrastructure and accounts, and revoked access to the Google Sheets API calls used by the Chinese snoops for command-and-control (C2) purposes.
  • "As of Feb. 18, GTIG's investigation confirmed that UNC2814 has impacted 53 victims in 42 countries across four continents, and identified suspected infections in at least 20 more countries," the threat hunters said in the report.
  • The security sleuths uncovered this campaign during a Mandiant investigation into suspicious activity in a customer's environment. Specifically, this binary, "/var/tmp/xapt," initiated a shell with root privileges, and then executed a command to retrieve the system’s user and group identifiers to confirm it had successfully escalated to root.
  • Google suspects the payload was named xapt, after the command-line tool in Debian and Ubuntu systems, to make it easier to hide in the victim's environment and look like a legitimate tool.
  • The intruders also used a novel backdoor, Gridtide, that abuses legitimate Google Sheets API functionality to disguise its command-and-control (C2) traffic. Mandiant has linked Gridtide to UNC2814.
  • The intruders also used a novel backdoor, Gridtide, that abuses legitimate Google Sheets API functionality to disguise its command-and-control (C2) traffic. Mandiant has linked Gridtide to UNC2814.
  • After breaking in, the spies moved laterally via SSH, performed reconnaissance, escalated privileges, and then deployed the Gridtide backdoor using a command, "nohup ./xapt," that allows it to run even after the user closes the session.
  • "Subsequently, SoftEther VPN Bridge was deployed to establish an outbound encrypted connection to an external IP address," the threat intel team wrote. "VPN configuration metadata suggests UNC2814 has been leveraging this specific infrastructure since July 2018."
  • The C-based backdoor uses Google Sheets as its C2 platform, can execute shell commands, and can upload and download files. In this case, the attacker deployed Gridtide on an endpoint containing personal information - likely to identify and track persons of interest - including full name, phone number, date and place of birth, voter ID and national ID numbers.
[–] Kailn@lemmy.myserv.one 3 points 2 weeks ago

Imagine if they put all that money into developing a decent product that might return some actual revenue.

Nah, let use all these PC components for something wasteful.

[–] Kailn@lemmy.myserv.one 4 points 3 months ago

I ended up writing so much that I made an essay long reply.
Sorry for the inconvince & wait...

[–] Kailn@lemmy.myserv.one 7 points 3 months ago (8 children)

I know this is supposed to be compared with Vmware ESXi &or Proxmox but exclusively made for linux containers, so...
How well can it compare with MicroOS & CoreOS which rely podman instead?
I've never seen a detailed comparison between podman & incus in term of resource usage nor performance, just that podman supports docker compose & it's images.

[–] Kailn@lemmy.myserv.one 2 points 5 months ago

So more ppl are re-purposing old, legacy win7 machines despite security risk...
Completely clueless about anything linux or floss in that matter wether even if there where lighter distros with better hardware support & enough apps for everyday office needs & more.

Like win7 can't even run any UWP apps, photoshop or steam anymore.
It's great livin' in 2025