Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Technology
  3. What part of it is malicious?

What part of it is malicious?

Scheduled Pinned Locked Moved Technology
4 Posts 3 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K This user is from outside of this forum
    K This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #1

    What part of it is malicious? From what I understood, it is a illegal music downloading platform, and they say it opens its users to "plegal action".

    Are we calling pirating-enabling software malicious now? Because pirating is ilegal?

    U N 2 Replies Last reply
    0
    • System shared this topic on
    • K [email protected]

      What part of it is malicious? From what I understood, it is a illegal music downloading platform, and they say it opens its users to "plegal action".

      Are we calling pirating-enabling software malicious now? Because pirating is ilegal?

      U This user is from outside of this forum
      U This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #2

      I assume the malicious part is that it phones home without permission, likely tracking users without their consent or informing them.

      1 Reply Last reply
      0
      • K [email protected]

        What part of it is malicious? From what I understood, it is a illegal music downloading platform, and they say it opens its users to "plegal action".

        Are we calling pirating-enabling software malicious now? Because pirating is ilegal?

        N This user is from outside of this forum
        N This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #3

        I agree the article isn't super clear. Reading it twice, it seems that the user credentials are exfiltrated to the C2 server (only the screenshot implies it), which definitely would be malicious.

        Also a possible interpretation could be that the package advertised "just" some automations (e.g. export playlists to m3u?) and getting music metadata, whereas it was actually downloading musics locally unbeknownst to the user. Then exfiltrating the music back to the C2 server, effectively using the package's users to mass pirate musics without exposing the pirates directly. That would indeed be malicious, especially if the package did not advertise any content downloading.

        But for the last paragraph I'm extrapolating on the few info this article gives without making much sense..

        K 1 Reply Last reply
        0
        • N [email protected]

          I agree the article isn't super clear. Reading it twice, it seems that the user credentials are exfiltrated to the C2 server (only the screenshot implies it), which definitely would be malicious.

          Also a possible interpretation could be that the package advertised "just" some automations (e.g. export playlists to m3u?) and getting music metadata, whereas it was actually downloading musics locally unbeknownst to the user. Then exfiltrating the music back to the C2 server, effectively using the package's users to mass pirate musics without exposing the pirates directly. That would indeed be malicious, especially if the package did not advertise any content downloading.

          But for the last paragraph I'm extrapolating on the few info this article gives without making much sense..

          K This user is from outside of this forum
          K This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #4

          I see, makes sense, so the problem is that the user tokens are collected without knowledge and could be used for pirating

          1 Reply Last reply
          0
          • System shared this topic on
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • World
          • Users
          • Groups