I take my shitposts very seriously.

  • 15 Posts
  • 1.17K Comments
Joined 1 year ago
cake
Cake day: June 24th, 2023

help-circle








  • rtxn@lemmy.worldtolinuxmemes@lemmy.worldCtrl + Shift + A
    link
    fedilink
    English
    arrow-up
    12
    ·
    edit-2
    2 days ago

    Blender uses Alt+A.

    It consistently uses Alt as a modifier to execute inverse operations. I to insert a keyframe, Alt+I to delete it. Ctrl+F to set a text filter/search, Alt+F to clear it. Ctrl+P to set parent, Alt+P to clear it. H to hide selected objects, Shift+H to hide unselected objects, Alt+H to unhide all. {G,R,S} to move/rotate/scale, Alt+{G,R,S} to reset transformations. It’s not exactly industry standard, but internally consistent that makes learning it easy.

    Ctrl+D to deselect is stupid.



  • OP didn’t bother to write it, so I will. The infection vector is an executable distributed through mail, targeting computers of the Indian government.

    According to Volexity, the malware was discovered after the researchers spotted a UPX-packed ELF executable in a ZIP archive, likely distributed through phishing emails. Volexity believes that the malware targets a custom Linux distribution named BOSS that Indian government agencies use as their desktop.

    When executed, the malware will download and display a PDF lure that is a beneficiary form from India’s Defence Service Officer Provident Fund in case of an officer’s death.

    However, additional payloads will be downloaded in the background, including the DISGOMOJI malware and a shell script named ‘uevent_seqnum.sh’ that is used to search for USB drives and steal data from them.

    When DISGOMOJI is launched, the malware will exfiltrate system information from the machine, including IP address, username, hostname, operating system, and the current working directory, which is sent back to the attackers.

    To control the malware, the threat actors utilize the open-source command and control project discord-c2, which uses Discord and emojis to communicate with infected devices and execute commands.

    The malware will connect to an attacker-controlled Discord server and wait for the threat actors to type emojis into the channel.