this post was submitted on 19 Nov 2023
704 points (90.6% liked)

linuxmemes

21272 readers
654 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.

  • Please report posts and comments that break these rules!

    founded 1 year ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] Ooops@kbin.social 31 points 1 year ago (2 children)

    Malware for desktop users is the low hanging fruit with little rewards. You just hear about it because it's so rediculous easy.

    The real money is on servers, so that's were real money/work is invested to develop malware for much higher gains. How successful are they again?

    [–] Gork@lemm.ee 14 points 1 year ago* (last edited 1 year ago)

    I think you're right. A single desktop, unless it is either someone in a position of power or access to trade secret files, is not a time effective attack vector.

    A server on the other hand can access all of that stuff across an entire organization.

    [–] Streetdog@sh.itjust.works 8 points 1 year ago (1 children)

    That's exactly why only the rich get scammed.

    [–] Ooops@kbin.social 1 points 11 months ago* (last edited 11 months ago)

    Of course not. There is a market for investing very little for some cheap malware and then putting it out there, waiting for the small amount of people (out of a billion of desptop users) falling for it. Also you go for the weakest link in defense, so scamming random desktop users is rarely a technical feat. It usually exploits the human, not the system.

    But we also all know how money is actually distributed. So millions of random users being scammed for some money is still not the high reward scenario a server is. Much more work is invested there because the rewards are so much higher. And yet even then you often target people as the weak link. System security for a company is mainly user security. Teaching them to not fall for for scams as an entry way to the system. And there are a lot of professionals that basically made this their own social science of how I convey those things the best, how I enforce and regularly refresh those lessons, how to make people stick to best practices.

    Are you trying to tell me this all happens in parallel to a technical server structure that actually isn't that safe but rarely exploited because nobody could be bothered to check for vulnerabilities as it's just Linux and the adoption rate is low?