Thanks to a combination of sophisticated methodology and social engineering, this particular attack seems to be very difficult to stop.
@[email protected]
link
fedilink
English
61Y

This is bad, but only seems to be related to forks from main (correct me if I am wrong). So if you go to source, you should be OK.

adding its own malicious code which is concealed under seven layers of obfuscation

Behind seven vpns?

Heratiki
link
fedilink
71Y

I’m thinking the code is obfuscated by random calls to various functions so that the code block isn’t just one section you can easily see but sprinkled throughout instead.

@[email protected]
link
fedilink
English
31Y

Yes that seems like the case, it just struck me as funny

@[email protected]
link
fedilink
English
31Y

You’re not OK. Not all forks are labeled as forks.

@[email protected]
link
fedilink
English
11Y

Thank you for the clarification

That will teach them a lesson about training models on random repositories.

Create a post

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

  • 1 user online
  • 51 users / day
  • 90 users / week
  • 284 users / month
  • 2.04K users / 6 months
  • 1 subscriber
  • 3.25K Posts
  • 45K Comments
  • Modlog