continue more of this, i see not many people have seen this so i just wanna support you. Keep these good videos up! I've been here for a while now and i've really been enjoying your content
Running random executables on any operating system is a big no-no. Weather that be Windows, Mac or Linux. Especially as root on the last two platforms. If you run any executable as root, you must always take in to account wether or not you trust that application with all of your data. That's why distributions that are beginner friendly insist on you creating an account that isn't root, like ubuntu or debian for instance. Should you run a random executable as a non-privilaged user, just about the only thing it can touch is /home/username and whatever else the user has permissions to.
True, I don’t think a person would execute random executables with root privileges like this on their Linux/Mac system. Chances of this variant of KillDisk actually damaging victims are very low. But nonetheless, its a bit different from usual ransomware we see everyday and that interests me lol
@@Sumire973 That’s true. But that’s the whole point between separation of root/user. Run any malware all you want in Linux, and as long as you don’t give it your root password, it can’t affect the system as a whole. (I mean, in theory. Some userland programs must run as root, and are spawned by sysvinit, systemd, upstart, etc… if you find an exploit for one of those programs, you can do privilege escalation attacks. Best mitigation to that is… update your installation as soon as possible. Just like the latest log4j garbage)
Always make backups, do not assume a OS will always be safe from vulnerabilities as long as it's connected to the Internet. And of course, it's important if storage medium dies or gets bad sectors, corrupting data. When making backups to an offline disk, is probably good idea boot up a external Linux Distro from a USB stick and backup whatever files from the partition that you require through that, this will erase the potential of the previous existing several good backups from a week, month or year ago, on that offline disk, being destroyed by ransomware from the OS you are doing the backup on. Also, Never connect that USB stick to your system or anything that could br possible infected, since then the content of the USB storage medium can be infected too. As for backup to NAS, enable on the NAS, hourly or daily incremental, differential, ZFS snapshot, etc, (shouldn't take much space anyway, since that only save difference in data) this will eliminate the potential of a ransomware to overwrite all the files on all available network shares, since everyday a snapshot is made on the NAS and you can rollback to the previous good files. Of course it's important to know that if you have automatic snapshot deletion on too much space usage enabled, then the ransomware could delete the snapshots by keep copying files and the NAS making snapshots of those encrypted files. If you keep watch over space usage, you should notice if something weird is going on, like a sudden almost double or triple increase in space usage for no reason. But even with this, NAS can have a vulnerability in software, like with Synology, which had Synolocker and several other ransomware, people got when running these on internet, either through port forward router, or Synology's own reverse proxy. So offline backup is important...perhaps good idea to keep 2-3 HDD's, where a backup on 1 drive is done every 6-12 months (though, note keeping HDD or SSD with no power too long may cause bitrot or corruption), and other done monthly or weekly. Were if a ransomware problem is there and it got to Everything connected to the network, infecting for 1-2 months in background, before displaying ransom popup, at least there is a backup from 1 year ago. And lastly, don't run Random Sheit you don't actually know if it's safe and legit, especially random junk from people on Discord, Facebook, mail, etc, also don't plug in random USB devices (BadUSB), also don't make your stuff accessible from the internet...unless maybe through OpenVPN, which was configured securely, with a Very long key, and kept up to date.
Alternatively, you could use YT itself to slow down the video: Settings / Playback speed. (Probably have to mute because the music will slow down as well.)
I feel like this one's less ransomware and more just... killware, but maybe someone has tried to send something to that address already. Interesting video.
No, it definitely counts as ransomware. I'm pretty sure the definition doesn't require the ransomers to do what they say they will in exchange for the ransom. And if they actually demand something people can reasonably pay (i.e. much less than 222 BTC), what's important to them is they get money (never mind that keeping their promise might be better for them in the long run). And no, no one ever sent anything to that address. You can type it into any blockchain explorer and see for yourself. That said, I can't tell from this video whether the address is hard-coded, or is generated from a master public key, or whatever. If there is a master key and it can be extracted, it would be possible to generate all possible addresses and check them. That's a big if, though.
@@malwaretestingfan WTF are you saying? First of all, what does intent to destroy have to do with it being ransomware? If it makes your data inaccessible and demands a ransom to get it back, how is it not ransomware? Heck, apparently there is some ransomware that merely disables access to the system in a way that is easy to fix; that doesn't destroy anything, nor is it at all competent, but it still counts. Second, this thing encrypts files with random keys that are immediately forgotten, thus ensuring that, for all practical purposes, they cannot be recovered. You can't tell me the people who made it into ransomware simply forgot to have it save the keys (unless they were just exceptionally incompetent). By all appearances, it deliberately destroys data. And then it demands a ransom (which as it just so happens, can never actually result in the data's restoration, which is an extra layer of evil, but whatever). So even by your strange definition, it looks like it still counts.
@@fllthdcrb It intentionally destroys data, that's enough to classify it as a "wiper" (just a Trojan, or McAfee's Trojan-Wiper classification) rather than a ransomware (Trojan-Ransom). Also, i meant "intended" in the malware classification sense, where a malware is "intended" when the malware does vastly different things from what the authors coded it to do. KillDisk is not "intended" because the authors never wanted to code a ransomware to begin with, it was no more but a wiper. It did not end up as a wiper because the authors were incompetent. Keep also in mind that malware classification accepts "overlaps": NotPetya spreads on the Web and is a wiper, but it's not mainly classified as a Net-Worm.
@@malwaretestingfan I see. So, by "authors", you mean whoever coded the original version that targeted the Ukraine infrastructure, as opposed to whoever modified it? Now I think I understand. Though I must say, my outsider opinion on this way of classification is that it's a bit counter-intuitive.
@@RifmarioGamer Too bad sysadmins don't think a random exploit that allows an entire disk to be remotely encrypted is cool, so software is designed to not allow for such an event to occur.
What should also make your stomach turn is this guy ran it with root giving it full control over his system. Running this as a normal user would have almost no repercussions, the only files in danger would be your home directory
Yes, it's pretty obvious that malware can exist on Linux. However, this is not a virus, it's ransomware. It would be a virus if it infected the computer remotely. This is much easier to do with Windows systems that are filled with security holes and the patching of which takes literally forever. Random malware in general is also more powerful on Windows, as the Windows way is just inherently insecure. People basically click yes on the UAC prompt every day, and so it's easy for any malware to gain privileges. On the other hand, Linux users install software with a package manager, and root access isn't really used for much else, so it would be kinda sus to ask someone to run this thing as root.
@@chlorobyte_projects well unexperienced users might run it as root, but i dont think they really know what linux is, so it is really unlikely that linux will have viruses, compared to windows
If the user installs qemu-user-static the x86 malware will run directly on ARM, as it installs a x86 emulator. The inverse also happens similarly. (A ARM binary on x86).
@@taiekvana Thank you! I have been distro-hopping for a while, but have never tried Ubuntu, so I saw that theme and liked it, so I just asked what it is. Thank you for answering me :)
You mean which programming language was the malware written in? It would be hard to be sure when only a binary is available. However, given that it appears to be linked against libc, C is likely.
Lubuntu está a salvo, es incapaz de ejecutar archivos que no sean .deb debido a que carece de muchas librerías. 3:56 POV: estabas probando linux desde una USB y esta se desconecta.
Oh man, this malware using that name is not good for LSoft Technologies, a company making all sorts of reputable tools , including a disk or partition eraser named KillDisk, which you can compare the usage to Darik's Boot and Nuke (DBaN), except KillDisk has a really nice interface and, has a program for Windows, bootable disk which uses Linux Kernel (old one DOS), and other things.
You can’t say malware is bad is bad if you run it with root. This would never be able to survive a device reboot given it was run by a normal user, and if it was it would not be hard to kill it
As you saw, it requires... user co-operation. You have to run it as root, otherwise it can't work. If we call that "malware" I suppose that an email saying "please run sudo rm -rf / and pay me to tell you what happened" is also malware...
The ransomware adaptation seems to have emerged in January 2017, when BTC traded around US$1000, which means 222 BTC would be about US$222,000. That's still a hefty amount for smaller companies, isn't it? And BTC grew considerably in value over that year, so anyone who fell prey to this thing later in the year would be facing even larger demands in USD terms. Especially in December when it skyrocketed to a peak of almost $20,000. That said, if you look up the address from the ransom note this video shows, you'll see it's untouched. So either this thing completely failed in its primary purpose, or there were many other addresses, in an HD wallet or similar.
Consider talking in the videos, I find it easier listening than reading the subtitles. Don't worry about your voice or accent, no one will say anything or if they do say something bad, they'd be suckers, lol.
How stupid must someone be to run an executable from the internet as root? This really isn't a realistic scenario. Its like someone telling you to do sudo rm -rf / and you do it.
Linux newbie: Hey how should I protect my linux install against malware? Reddit techbros: LOL N00b linux doesnt get viruses or malware, dumbass Malware on linux:
Well, the name is also being used by a program from LSoft Technologies, have been using it for a long time to quickly erase content of disks (overwrite zero's), for refurbishment of HDD, for more important data, i used DBaN, and then shredded the HDD's. Was surprised to see a ransomware people name KillDisk, thought what the hell happened, did LSoft go rogue?
Oh, so you had to make it executable first and then add password several times and also rename the file to make it work... Linux seems to be quite safe then :)
Siam Alam once got attacked by a Ransomware, now he is really scared of them and makes these videos. Keep it going fam
wait really?
@𓀐𓂸 oh god
@𓀐𓂸 what the actual f-
@𓀐𓂸 How are these even unicode characters?
@𓀐𓂸 WOT, how u dat cursed characters
continue more of this, i see not many people have seen this so i just wanna support you. Keep these good videos up! I've been here for a while now and i've really been enjoying your content
It couldn't override GRUB since you didn't execute it as root. Generally, you should never execute random scripts with root privileges on Linux
Linux is meant to be secure and i definitely agree.
Just shows that Windows' UAC is completely useless even if you're an admin
@@JayCeeCreates Windows UAC is intended to be used by a standard/normal user tho
I mean... you shouldn't run random code in general, no matter what permissions or OS.
sorry sudo and doas
When siam posts, and i hear a banging intro, i know this video is gonna be good. keep up siam.
Running random executables on any operating system is a big no-no. Weather that be Windows, Mac or Linux. Especially as root on the last two platforms. If you run any executable as root, you must always take in to account wether or not you trust that application with all of your data. That's why distributions that are beginner friendly insist on you creating an account that isn't root, like ubuntu or debian for instance. Should you run a random executable as a non-privilaged user, just about the only thing it can touch is /home/username and whatever else the user has permissions to.
True, I don’t think a person would execute random executables with root privileges like this on their Linux/Mac system. Chances of this variant of KillDisk actually damaging victims are very low. But nonetheless, its a bit different from usual ransomware we see everyday and that interests me lol
There is malware that can bypass antivirus programs as well.
Indeed, but i guess the authors planned on using exploits in targeted campaigns rather than using them against the common user.
@@SiamAlamOfficial there are crypto scam boys in your comments. On a youtuber that promotes security and shows of malware 😭😭😭
@@Sumire973 That’s true. But that’s the whole point between separation of root/user. Run any malware all you want in Linux, and as long as you don’t give it your root password, it can’t affect the system as a whole. (I mean, in theory. Some userland programs must run as root, and are spawned by sysvinit, systemd, upstart, etc… if you find an exploit for one of those programs, you can do privilege escalation attacks. Best mitigation to that is… update your installation as soon as possible. Just like the latest log4j garbage)
Always make backups, do not assume a OS will always be safe from vulnerabilities as long as it's connected to the Internet. And of course, it's important if storage medium dies or gets bad sectors, corrupting data.
When making backups to an offline disk, is probably good idea boot up a external Linux Distro from a USB stick and backup whatever files from the partition that you require through that, this will erase the potential of the previous existing several good backups from a week, month or year ago, on that offline disk, being destroyed by ransomware from the OS you are doing the backup on.
Also, Never connect that USB stick to your system or anything that could br possible infected, since then the content of the USB storage medium can be infected too.
As for backup to NAS, enable on the NAS, hourly or daily incremental, differential, ZFS snapshot, etc, (shouldn't take much space anyway, since that only save difference in data) this will eliminate the potential of a ransomware to overwrite all the files on all available network shares, since everyday a snapshot is made on the NAS and you can rollback to the previous good files.
Of course it's important to know that if you have automatic snapshot deletion on too much space usage enabled, then the ransomware could delete the snapshots by keep copying files and the NAS making snapshots of those encrypted files. If you keep watch over space usage, you should notice if something weird is going on, like a sudden almost double or triple increase in space usage for no reason.
But even with this, NAS can have a vulnerability in software, like with Synology, which had Synolocker and several other ransomware, people got when running these on internet, either through port forward router, or Synology's own reverse proxy.
So offline backup is important...perhaps good idea to keep 2-3 HDD's, where a backup on 1 drive is done every 6-12 months (though, note keeping HDD or SSD with no power too long may cause bitrot or corruption), and other done monthly or weekly. Were if a ransomware problem is there and it got to Everything connected to the network, infecting for 1-2 months in background, before displaying ransom popup, at least there is a backup from 1 year ago.
And lastly, don't run Random Sheit you don't actually know if it's safe and legit, especially random junk from people on Discord, Facebook, mail, etc, also don't plug in random USB devices (BadUSB), also don't make your stuff accessible from the internet...unless maybe through OpenVPN, which was configured securely, with a Very long key, and kept up to date.
"You can lost your data or pay 222 BTC to ..."
Ah, as a virus remove technician, I well familar with this.
"Well, somebody did. They used ransomware to lock the doctors out of their own systems. And their demanding millions." (c) Josh Sauchak.
hello, where can i get the sampla of this malware to download? I would like to do some tests in a controlled environment
At least the fee is only 222 btc, thats like nothing right?
Except for the fact that 222 bitcoins cost millions of dollars
someone: It is impossible to break linux
that one guy:
Its very easy to break Linux if you want to, that is.
I wonder how it displays the ransom note if GRUB is not installed
I am really curious if this ransomware can run on mac. They both cousins, Unix XNU and Linux GNU.
Siam Sir I would request if you keep subtitles for bit more longer...its hard to read them without pausing the video.
same
sure! I will make sure to keep them longer next time.
Alternatively, you could use YT itself to slow down the video: Settings / Playback speed. (Probably have to mute because the music will slow down as well.)
Can you repeat the experiment with immutable settings, like AppArmor hardening?
I feel like this one's less ransomware and more just... killware, but maybe someone has tried to send something to that address already. Interesting video.
No, it definitely counts as ransomware. I'm pretty sure the definition doesn't require the ransomers to do what they say they will in exchange for the ransom. And if they actually demand something people can reasonably pay (i.e. much less than 222 BTC), what's important to them is they get money (never mind that keeping their promise might be better for them in the long run). And no, no one ever sent anything to that address. You can type it into any blockchain explorer and see for yourself. That said, I can't tell from this video whether the address is hard-coded, or is generated from a master public key, or whatever. If there is a master key and it can be extracted, it would be possible to generate all possible addresses and check them. That's a big if, though.
@@fllthdcrb No, it's a wiper. It could be counted as ransomware only if it's destructive actions were intended, but they are not.
@@malwaretestingfan WTF are you saying? First of all, what does intent to destroy have to do with it being ransomware? If it makes your data inaccessible and demands a ransom to get it back, how is it not ransomware? Heck, apparently there is some ransomware that merely disables access to the system in a way that is easy to fix; that doesn't destroy anything, nor is it at all competent, but it still counts.
Second, this thing encrypts files with random keys that are immediately forgotten, thus ensuring that, for all practical purposes, they cannot be recovered. You can't tell me the people who made it into ransomware simply forgot to have it save the keys (unless they were just exceptionally incompetent). By all appearances, it deliberately destroys data. And then it demands a ransom (which as it just so happens, can never actually result in the data's restoration, which is an extra layer of evil, but whatever). So even by your strange definition, it looks like it still counts.
@@fllthdcrb It intentionally destroys data, that's enough to classify it as a "wiper" (just a Trojan, or McAfee's Trojan-Wiper classification) rather than a ransomware (Trojan-Ransom). Also, i meant "intended" in the malware classification sense, where a malware is "intended" when the malware does vastly different things from what the authors coded it to do. KillDisk is not "intended" because the authors never wanted to code a ransomware to begin with, it was no more but a wiper. It did not end up as a wiper because the authors were incompetent. Keep also in mind that malware classification accepts "overlaps": NotPetya spreads on the Web and is a wiper, but it's not mainly classified as a Net-Worm.
@@malwaretestingfan I see. So, by "authors", you mean whoever coded the original version that targeted the Ukraine infrastructure, as opposed to whoever modified it? Now I think I understand. Though I must say, my outsider opinion on this way of classification is that it's a bit counter-intuitive.
It would be better if killdisk were a worm and can encrypt all devices conected to the same network, that would be BRUTAL
Well don't give em ideas
That should be impossible
@@jurivjerdha2467 It shouldnt, it would be very cool
@@RifmarioGamer Yea, cool until you accidentally download it lol ._.
@@RifmarioGamer Too bad sysadmins don't think a random exploit that allows an entire disk to be remotely encrypted is cool, so software is designed to not allow for such an event to occur.
So if you don't make it executable (+x) and don't run it as root, then it can't do anything. Some malware...
What happens if you boot the linux after the script ? You could still boot via grub minimal
it will probably show unsupported executable format or something like that
wow, honestly as a linux user, this made my stomach turn upside down.
What should also make your stomach turn is this guy ran it with root giving it full control over his system. Running this as a normal user would have almost no repercussions, the only files in danger would be your home directory
@@Chriss4123 just be careful when u use sudo ;)
Thanks brother❤️ we need to clear concept that linux can also be affected by computer viruses. BTW I have seen this for the first time.
except its really hard to do so
Yes, it's pretty obvious that malware can exist on Linux.
However, this is not a virus, it's ransomware. It would be a virus if it infected the computer remotely. This is much easier to do with Windows systems that are filled with security holes and the patching of which takes literally forever.
Random malware in general is also more powerful on Windows, as the Windows way is just inherently insecure. People basically click yes on the UAC prompt every day, and so it's easy for any malware to gain privileges. On the other hand, Linux users install software with a package manager, and root access isn't really used for much else, so it would be kinda sus to ask someone to run this thing as root.
@@chlorobyte_projects well unexperienced users might run it as root, but i dont think they really know what linux is, so it is really unlikely that linux will have viruses, compared to windows
First time I seen ransomware for a Linux system.
Edit: Does it affect systems running on ARM?
Nope because it's compiled for X86(_64)
If the user installs qemu-user-static the x86 malware will run directly on ARM, as it installs a x86 emulator. The inverse also happens similarly. (A ARM binary on x86).
Love the music!
Oh hi
Side note, but what theme of ubuntu is that, also is it Ubuntu, or is it another distro, based on it?
It's just plain Ubuntu with a different background.
@@taiekvana Thank you! I have been distro-hopping for a while, but have never tried Ubuntu, so I saw that theme and liked it, so I just asked what it is. Thank you for answering me :)
If I end the project "DOSmetry Dash Trojan", can I give you the malware for only a demostration?
What is the sense if Ubuntu always asks to you the autentication before running executable txts?
@Sascha Because of this, the worm can't start alone
@Sascha Anyway it's not sense, because it can't start alone. You are going to be very insane if you start the ransomware on your main pc
@Sascha In linux, file extension doesn't matter in most cases.
can i get the file or the virus file, i need it cuz i want to use it for my project demonstration
thank sir. my pc has attacked by .utjg ransomware . need your advice to recover my file.
Alternative for dban?
Nice video bro! Happy to see you back here!
"222 btc"
no one is gonna be able to pay that
I guess that's the point, it's a wiper.
@@malwaretestingfan Well, maybe, but why bother including a ransom note? With a valid Bitcoin address?
@@fllthdcrb I think it's to disguise as a legitimate ransomware.
can you recorde video for the dangerus malware and virus in system phone and thk
is the Killdisk by Lsoft active @
Hey bro how do I recover .mljx ransomware files?
how old is this ransomware? Asking for 222 Btc is like Dr. Evil asking for 100 billion dollars in 1969
Pls make tutorial on how to run vm mine keeps crashing cuz of Failed to open session
What is the time of fmv 99
Any solution FOR . MME ransomwre
To be honest no ordinary linux user would get this ransom on their PC. Since it was targetted towards Servers from what I understood. :P
I use Arch BTW
I use Mint BTW 😎
I use windows 10 BTW
I use Gentoo BTW
I use Windows 11 btw
what is the name of this linux?
Shiz, gotta look out for this now. Thanks for the video, it’s been an education.
@Watcher I had no idea about this till now XDXDXS
Do siam alam use virtual machines ?
Hi brother. My laptop attacked by rigj Ransomware Virus... And Encrypted.. Can you help me please. I hv more important fils...
ah yes because who doesent have 222 bitcoins just lying around in a wallet
in wich language is this written ?
You mean which programming language was the malware written in? It would be hard to be sure when only a binary is available. However, given that it appears to be linked against libc, C is likely.
the intro music was so awesome, please link me the music
"This is amazing! Pretty much nothing seems to work"
Lubuntu está a salvo, es incapaz de ejecutar archivos que no sean .deb debido a que carece de muchas librerías.
3:56 POV: estabas probando linux desde una USB y esta se desconecta.
Oh man, this malware using that name is not good for LSoft Technologies, a company making all sorts of reputable tools , including a disk or partition eraser named KillDisk, which you can compare the usage to Darik's Boot and Nuke (DBaN), except KillDisk has a really nice interface and, has a program for Windows, bootable disk which uses Linux Kernel (old one DOS), and other things.
I need more of these Linux malware investigation
what if i use systemd-boot or other bootloader
There's a strong chance KillDisk will fail to display it's message payload, if anything.
i love these ransomware videos!
You can’t say malware is bad is bad if you run it with root. This would never be able to survive a device reboot given it was run by a normal user, and if it was it would not be hard to kill it
What is your OS?🤔
Ubuntu
thats ubuntu linux?
Yes
ok so now i know linux can get virus
yeah, linux cant get virus that the virus working on windows. u must try and do commands. to open it.
any os can get virus
@@mrpro2264 temple os when?
Any OS. Even MAC and IOS. Even a toaster if you try hard enough.
Any OS can, Linux is just harder to target (only in Desktop systems, Android phones and IoT devices are the most easy to infect).
Thanks god i keep all my data handwritten in a safe under my garden
It removes the encryption keys? Thats a big Oof
Well, "remove" implies they were permanent in any real way to begin with. They're probably just kept in RAM as long as necessary to encrypt each file.
> kept a Dan Terminus song in the VM
chad.
Windows User: Oh fuck! there is another terrible virus ahead of us!
Linux User: Virus? I don't even know what was that.
Vesad ransomware encrypted my files
They don't want money, who has 222 BTC?
Large billionaires prob. Other than that, nobody
@@yharim180 Then they probably have super secure systems?
2015 btc price
@@bitelaserkhalif hmm
You can click middle mouse button to close tabs
Love the music.
There is no such thing as a OS that is safe from vulnerabilities. Make sure to backup your devices EVERY DAY! MAKE IT A ROUTINE!
Linux ransomware, I didn't know it was possible.
As you saw, it requires... user co-operation. You have to run it as root, otherwise it can't work. If we call that "malware" I suppose that an email saying "please run sudo rm -rf / and pay me to tell you what happened" is also malware...
5:36 crypto mail lol
Nice, now try it out vs. Antivirus
One does not simply grant sudo perms to random scripts.
bro they asking for €5,997,313.21 rn 💀
Finally a Linux malware!!
Let's gooooo, hope I get infected sooon
@@apolsorgdme too
@Watcher yeah I know but with the comment I intended finally a Linux malware on this channel or on UA-cam
Say
GOODBYE
Most ransomware is not compatible with linux, but this one obviously is.
222 BTC. That virus must be built when it was worth crap because what company can afford 222 BTC?!
The ransomware adaptation seems to have emerged in January 2017, when BTC traded around US$1000, which means 222 BTC would be about US$222,000. That's still a hefty amount for smaller companies, isn't it? And BTC grew considerably in value over that year, so anyone who fell prey to this thing later in the year would be facing even larger demands in USD terms. Especially in December when it skyrocketed to a peak of almost $20,000.
That said, if you look up the address from the ransom note this video shows, you'll see it's untouched. So either this thing completely failed in its primary purpose, or there were many other addresses, in an HD wallet or similar.
i was literally even watching this on ubuntu
Consider talking in the videos, I find it easier listening than reading the subtitles. Don't worry about your voice or accent, no one will say anything or if they do say something bad, they'd be suckers, lol.
Let's get it
Siam Alam: _runs ransomware_ huh, Ubuntu is acting weird now.
yeah I wonder why???? 🥴
How stupid must someone be to run an executable from the internet as root? This really isn't a realistic scenario. Its like someone telling you to do sudo rm -rf / and you do it.
The malware is not for the average user. It's for targeted attacks from the part of Telebots.
@@malwaretestingfan Thanks for the explanation, whats a Telebot tho?
i wanna be a hacker, for pranks
@Watcher i chamnged my mind i want to make games
@Watcher thank you very much
Good bgm. I like it ☺️
Good video
Is this Linux?
@Miftik CZ also does he work with VMware?
Yes it’s Ubuntu Linux
PARDUS?
NO!
most brutal ransomware:
sudo rm -rf /
sudo su
then
mv / /dev/null
@Watcher cool i use doas
can you run the windows version next i want to see what happens to the windows boot
Amazing UA-camr
Linux newbie: Hey how should I protect my linux install against malware?
Reddit techbros: LOL N00b linux doesnt get viruses or malware, dumbass
Malware on linux:
well, sudo rm -rf / will get you the same
ugh, at 2018 btc was prolly 1400 usd. i wish i'd buy
thought it legit kills all hard drives lol. nice video tho
Well, the name is also being used by a program from LSoft Technologies, have been using it for a long time to quickly erase content of disks (overwrite zero's), for refurbishment of HDD, for more important data, i used DBaN, and then shredded the HDD's.
Was surprised to see a ransomware people name KillDisk, thought what the hell happened, did LSoft go rogue?
Linux: We are most secure OS
Me: Watching this on Windows
Oh, so you had to make it executable first and then add password several times and also rename the file to make it work... Linux seems to be quite safe then :)
pog
Nice video!
Uma vez eu fiz isso programando em C, é só c esquecer de usar ponteiros direito.
woah
awsm video ......
Yo logré matar el disco con la terminal de superusuario
Are all your videos sponsored by Intezer?
Meh
222 Bitcoin is $10,361,184 today.
yeah its insane it was $14,399,608.20 at its peak
This was from January 2017, when that would have been a _slightly_ less insane amount of ~$200,000. Still too much, though.