Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

just wondering... is there any defense normies like me can do? eg. turn some windows feature off?


It isn't exploitable remotely, so just don't run shady software.


[flagged]


That’s not a very helpful comment. Not everyone has a choice in what OS they use (especially if it’s at work)


At work, when windows is corporate policy, you do not need to care about exploits. It is literally other peoples' problem.


Its a problem for someone and knowing about any mitigation is helpful.


OK, yes, if you are the IT dept, you are on the hook. At least if you are the ones who picked windows. But maybe you didn't and strategically protested the directive to use windows that came from up above. Then again, you don't really have to care, not your problem...


It is your problem because IT’s job is to prevent this stuff from happening. It doesn’t matter if the order came down from above, you need to do what you can to mitigate damage.


There is a world of difference between "job" (try to do it properly) and "responsibility" (you are on the hook if things go wrong). If the order came from above and you pointed out the problems, it might still be your job. But not your responsibility.


You don't personally care so the rest of use should not care either? You think its someone else's problem, so hide the solution from everyone?


You buy support contracts and software from Microsoft so you don't have to care. If Microsoft fails like in this case, you just shouldn't give them money. In all cases, no need to ask anyone but Microsoft for a workaround or other info.


Why even bother reading anything on this site or commenting here when you can always just go to the source or manufacturer? Obviously, you have all of the answers anyway. Its clear no one here has anything to offer you. The rest of us however find value in understanding the experiences of others.


That's not a very helpful comment and highly subjective. Depending on their requirements and needs a different OS might not even be feasible.


hm... do you mean linux-based? can't... Korean banks have activeX + other crap requirements. (they even detect VMs in linux)

also, linux can't run apps like photoshop / adobe cc apps / etc

as for mac... I'm waiting for a M2 macbook pro 16 inch with RTX 3090 graphics for about $1500...


"also, linux can't run apps like photoshop / adobe cc apps / etc" - seem to run pretty well under Wine most of the time...


I haven't been able to get PS running in Wine since the 2017 CC release (and that required some hackery).

Are you aware of a way to get recent releases working aside from QEMU or KVM?


Run CC 2015?


Pihole with the right block list can prevent known malicious software from hitting its command and control endpoints.

They can always use DOH but you can block DOH domains via the pinhole as well.


It's pretty easy to hardcore IPs of doh resolvers and bypass pihole completely.


There’s considerable precedent for seeding IP lists or using stealthy tactics (e.g. imagine how it’d be trying to block something which searches Google or Twitter, hits a random ad network).


Fair enough. On the other hand it can also prevent users from stumbling upon malware distribution sites by both blocking them directly and secondly blocking advertisements that often link to malware.

All of this of course is part of defense in depth, multiple layers of incomplete protection is better than nothing at all.


Oh definitely, I'm not saying that there's _no_ benefit — the key point is the distinction between something which you control to something you don't. DNS filtering is good for clients you control but it's important to understand that you can't force malware to use it to avoid accidentally thinking that you're protected against other threats (which I've heard various times from people who should know better but weren't thinking about it carefully in-depth at the time).


isn't PiHole some kind of external firewall? that works 90% of the average-joe known botnets against a desktop PC, but it's not helpful for laptops / unknown-control endpoints. (or endpoints that are really good at hiding)


No, it’s a DNS server with blacklisting features. It can’t block traffic, it can only prevent some software from looking up addresses.


You can use PiHole or one of the many equivalents on a laptop or other location shifting device in a few ways:

1. Run it locally and have it configured to use a public name server as its source (if you run Windows/other there are not doubt native options that'll work this way too). Even if the network you connect to redirects requests to public DNS resolvers you'll still be going through your local filter. Though you'll need to set your machine to ignore DNS config via DHCP, and you'll have to point it at the local resolvers if the network simply blocks public DNS servers.

2. Run it in a VM or container, this would mean you can run PiHole specifically even if you are running Windows, and configure as above. Memory requirements are pretty low so unless you are using very low spec device it should fit.

3. If you have a hosted server (you can get a VPS big enough for PiHole for a few $/year) or a publicly addressable address at home, you can run a VPN and access it that way (assuming the network you are on does not block your VPN of choice of course). You don't have to run a VPN, but I'd not recommend running a publicly addressable DNS server. This will even work on phones depending on the OS there and the chosen VPN.

Of course these are not viable options for a lesser techie user.


PiHole is a network wide ad blocker that works at the DNS level. Basically you route all of your network's DNS requests through PiHole and it blocks any domains that are known ad/malware domains.


Why would you not just modify your hosts file on your machine? Do you really need a raspberry pi for this?


Sometimes you don't have access to the hosts file, like on an unrooted phone or a smart TV.


Aside from using IPs directly, modern malware often uses an algorithm to generate domain names for C&C communication. Good luck trying to use a domain whitelist on the modern internet because web developer seem to actively fight against such a concept as not using every domain they possibly can.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: