If you think a password prevents scanning in the cloud, think again:
Microsoft cloud services are scanning for malware by peeking inside users' zip files, even when they're protected by a password, several users reported on Mastodon on Monday.
Compressing file contents into archived zip files has long been a tactic threat actors use to conceal malware spreading through email or downloads. Eventually, some threat actors adapted by protecting their malicious zip files with a password the end user must type when converting the file back to its original form. Microsoft is one-upping this move by attempting to bypass password protection in zip files and, when successful, scanning them for malicious code.
While analysis of password-protected files in Microsoft cloud environments is well-known to some people, it came as a surprise to Andrew Brandt. The security researcher has long archived malware inside password-protected zip files before exchanging them with other researchers through SharePoint. On Monday, he took to Mastodon to report that the Microsoft collaboration tool had recently flagged a zip file, which had been protected with the password "infected."
[...] Fellow researcher Kevin Beaumont joined the discussion to say that Microsoft has multiple methods for scanning the contents of password-protected zip files and uses them not just on files stored in SharePoint but all its 365 cloud services. One way is to extract any possible passwords from the bodies of an email or the name of the file itself. Another is by testing the file to see if it's protected with one of the passwords contained in a list.
"If you mail yourself something and type something like 'ZIP password is Soph0s', ZIP up EICAR and ZIP password it with Soph0s, it'll find (the) password, extract and find (and feed MS detection)," he wrote.
[...] The practice illustrates the fine line online services often walk when attempting to protect end users from common threats while also respecting privacy. As Brandt notes, actively cracking a password-protected zip file feels invasive. At the same time, this practice almost surely has prevented large numbers of users from falling prey to social engineering attacks attempting to infect their computers.
One other thing readers should remember: password-protected zip files provide minimal assurance that content inside the archives can't be read. As Beaumont noted, ZipCrypto, the default means for encrypting zip files in Windows, is trivial to override. A more dependable way is to use an AES-256 encryptor built into many archive programs when creating 7z files.
(Score: 3, Funny) by Mojibake Tengu on Thursday May 18, @09:06AM (6 children)
True writers write LaTex in texmaker. And use mercurial. Or at least git.
The edge of 太玄 cannot be defined, for it is beyond every aspect of design
(Score: 3, Touché) by maxwell demon on Thursday May 18, @09:10AM (4 children)
LaTeX and mercurial, sure. But texmaker? No way. Either vi or Emacs.
The Tao of math: The numbers you can count are not the real numbers.
(Score: 3, Funny) by Mojibake Tengu on Thursday May 18, @11:03AM
Psst! Too heavy indoctrination does not apply well on beginners. While nurturing GUI-dependent digital toddlers, tread lightly...
The edge of 太玄 cannot be defined, for it is beyond every aspect of design
(Score: 3, Funny) by Reziac on Thursday May 18, @01:02PM (2 children)
Well do I remember my first (and last) encounter with Emacs...
Could not for the life of me figure out how to exit the durn thing, had somehow got it fullscreen, and wound up hitting reset to get out of it.
In my defense, I think it was also my second encounter with anything in the *NIX sphere (the first having been the Darwin PC beta... "Okay, it took two days to download on dialup, it installed, and I have a command line -- largest installed CLI in the history of computing. What do I =do= with it??")
And there is no Alkibiades to come back and save us from ourselves.
(Score: 2) by HiThere on Thursday May 18, @01:59PM (1 child)
I tried EMACS 3 or 4 times. It seemed like with so many proponents that HAD to be some good aspect. I was unable to find it. Even vi is better. (Note: I started off using things like ed, or ptss, but that didn't make me prefer that interface. These days I normally use geany.)
Also, however, the original claim was that "writers" should use it. This does NOT mean programmers. Programmers are an extremely small subset of writers, and have quite different needs from most of them.
Javascript is what you use to allow unknown third parties to run software you have no idea about on your computer.
(Score: 2) by Reziac on Thursday May 18, @02:48PM
Yeah, that was where I was with Emacs... it's such a big deal, it should be great, right?? RIGHT?!
Not a programmer but I like Kate, tho mostly use it as a Notepad replacement. Unfortunately we do not seem to even =have= a proper, dedicated RTF editor on linux. Or =any= RTF editor. (No, LibreOffice doesn't count, have you =seen= what it does to the formatting??! I can hand-write the formatting codes faster than I can clean that up.)
And everyone knows that REAL programmers do COPY CON PROGRAM.ZIP :D
And there is no Alkibiades to come back and save us from ourselves.
(Score: 2) by Reziac on Thursday May 18, @12:57PM
REAL programmers do COPY CON PROGRAM.ZIP
:D
And there is no Alkibiades to come back and save us from ourselves.