It's not difficult to distribute something with its permissions set to being executable already. This is a normal thing for software which is distributed for GNU/Linux. There's no need to get the user to enter terminal commands; you just need to convince them to extract a tar.gz and double-click on an executable file contained within.

Ransomware doesn't need root access to work, just access to the files in your home directory, so Windows users don't become any more vulnerable to this particular type of attack by disabling UAC.

Reply via email to