Ancestors

Toot

Written by Juan Nunez-Iglesias on 2025-02-04 at 06:23

I'm on a recently-updated macOS and I'm just hoping the site targets like IE-on-Windows XP or something, but is there any way to know? Is there a resource that will tell me “this site exploits CVE-??? and if you are on Safari 15.3 or later you won't be affected”?

=> More informations about this toot | More toots from jni@fosstodon.org

Descendants

Written by Kevin Neely :donor: on 2025-02-04 at 17:19

@jni

hybrid-analysis.com and urlscan.io asre good places to check a URL. I dropped your URL into HA, here is the overview report and here is the specific analysis (which is linked from the first one under sandbox.

You can ask HA to test it using a MacOS sandbox, but I'm not positive how to do that, so I did Win10. It looks to me like it pulls down files and executes them. So, even if crafted for Mac, if you didn't see/approve an execution, I doubt you have much to worry about.

[#]infosec #malware

=> More informations about this toot | More toots from ktneely@infosec.exchange

Written by Juan Nunez-Iglesias on 2025-02-05 at 00:44

@ktneely Thanks so much! I’d found urlscan which is where I got my “various online sources” malware classification, but it's a big gap from “this site has malware” to what you found with the HA sandbox. 🙏🙏

Is it really that easy to run an executable from a web browser on Windows???

My worry was whether there are exploits that allow you to bypass macOS's executable permissions. It sounds like that's unlikely, though. (Indeed I was never asked to download or run a thing. 😅)

Thanks again!!!

=> More informations about this toot | More toots from jni@fosstodon.org

Proxy Information
Original URL
gemini://mastogem.picasoft.net/thread/113944180075245058
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
267.990945 milliseconds
Gemini-to-HTML Time
0.835201 milliseconds

This content has been proxied by September (3851b).