Re: Internetbankieren op Linux doelwit nieuwe malware
There is mention of how: social engineering. People calling you with knowledge about you (facebook, seen at an ATM and followed you home, ...). De Standaard has an article where a guy just gave away his card and pin to the thieves (after he believed the story (social engineering) was true. "Dear Sir, we contact you because of problems with your last connection with the bank. Please install ... from ..." And that goes for everybody: Linux or not Linux.
The other concern is P2P where some users fetch free stuff that is offered free of charge by the maker (open source, open office, pdf-readers, ...) Why do some want to take the risk of contamineted software? Not approving stealing paid software and movies and ... i pay for their hours of hard labour and get zero risk of contaminated software, dvd's, ...
Op Thu Aug 08 2013 14:25:23 GMT+0200 (CEST), schreef Wouter Vandenneucker <[hidden email]>:
Seems to be real.. but there isn't a single bit of info about how it's deployed and how it functions..
It's fairly impossible to say how big the risk is.. On the other hand: installing untrusted stuff of which you don't know what it does is always stupid..
The bot won't get installed by anything else than the end user. Upstream there will be tests and people looking at the code.