• toothpaste_ostrich@feddit.nl
    link
    fedilink
    English
    arrow-up
    23
    arrow-down
    2
    ·
    23 hours ago

    I mean… For real, I’ve never heard of Linux systems being hacked this way. I’m sure it’s possible, but it certainly seems rarer.

    Slipping shit in upstream also certainly doesn’t happen "that* often. It takes effort to become recognised enough as a developer to be allowed access to the upstream code, meaning you can’t automate those kinds of attacks. (I imagine. Correct me if I’m wrong.)

    • sp3ctr4l@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      5
      ·
      edit-2
      17 hours ago

      It does happen occasionally, from time to time, but, because everything is gasp open source, it tends to get caught, identified, blocked/quarantined and then fixed considerably more rapidly, with decent fallback instructions/procedures in that interim period.

      Like apparently it actually just recently happened with some asshole uploading bs malware libs/sources to the AUR… even still, got caught pretty quickly.

      Also, you can basically describe the entire CrowdStrike fiasco as exactly this kind of upstream oopsie doopsie.

      Doesn’t really matter in the big picture if it was intentionally malicious or not, when you Y2K 1/4 of the world’s computer systems.

    • CallMeAnAI@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      8
      ·
      22 hours ago

      Absolute opposite. The majority of successful attacks you see today are identity management and supply chain attacks. If you walk into any OCIO office supply chain will be a top 3 concern.