Ransomware doesn't need root access to work, just access to the files in your home directory, so Windows users don't become any more vulnerable to this particular type of attack by disabling UAC.
It's not difficult to distribute something with its permissions set to being
executable already. This is a normal thing for software which is distributed
for GNU/Linux. There's no need to get the user to enter terminal commands;
you just need to convince them to extract a tar.gz and double-click on an
executable file contained within.
- [Trisquel-users] Ransomware in Trisquel/Ubuntu 0d54770d
- Re: [Trisquel-users] Ransomware in Trisquel/Ubuntu t8mf4nu6lizp
- Re: [Trisquel-users] Ransomware in Trisquel/Ubuntu mountainmoksha
- Re: [Trisquel-users] Ransomware in Trisquel/Ubuntu onpon4
- Re: [Trisquel-users] Ransomware in Trisquel/Ubuntu greatgnu
- Re: [Trisquel-users] Ransomware in Trisquel/Ub... onpon4
- Re: [Trisquel-users] Ransomware in Trisquel/Ubuntu fredo
- Re: [Trisquel-users] Ransomware in Trisquel/Ubuntu dguthrie
- Re: [Trisquel-users] Ransomware in Trisquel/Ubuntu codyhofstetter
- Re: [Trisquel-users] Ransomware in Trisquel/Ubuntu enduzzer
