Welcome
|
FAQ
|
Downloads
|
Wiki
Tiny Core Linux
Welcome,
Guest
. Please
login
or
register
.
Did you miss your
activation email
?
1 Hour
1 Day
1 Week
1 Month
Forever
Login with username, password and session length
News:
Need an
Introduction
to Tiny Core? Or peruse
Core Concepts
.
Home
Help
Login
Register
Tiny Core Linux
»
Off-Topic
»
Off-Topic - The Funnies
»
Innovative TC usage, qemu windows malware
« previous
next »
Print
Pages: [
1
]
Go Down
Author
Topic: Innovative TC usage, qemu windows malware (Read 72 times)
curaga
Administrator
Hero Member
Posts: 11041
Innovative TC usage, qemu windows malware
«
on:
November 05, 2024, 02:12:43 AM »
https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/
Even malware authors realize how nice TC is
qemu.exe happens to be signed, they run TC inside qemu on windows and then connect back. The article shows they mastered the use of bootlocal and filetool.sh.
Logged
The only barriers that can stop you are the ones you create yourself.
gadget42
Hero Member
Posts: 765
Re: Innovative TC usage, qemu windows malware
«
Reply #1 on:
November 05, 2024, 03:42:18 AM »
reminds of Rule 34
https://xkcd.com/305/
https://en.wikipedia.org/wiki/Rule_34
just sayin'
Logged
The fluctuation theorem has long been known for a sudden switch of the Hamiltonian of a classical system Z54 . For a quantum system with a Hamiltonian changing from...
https://forum.tinycorelinux.net/index.php/topic,25972.msg166580.html#msg166580
Print
Pages: [
1
]
Go Up
« previous
next »
Tiny Core Linux
»
Off-Topic
»
Off-Topic - The Funnies
»
Innovative TC usage, qemu windows malware