logoalt Hacker News

mdavidnyesterday at 10:54 PM2 repliesview on HN

If the payload couldn't execute at install time, it would at runtime? Disabling prepare scripts does not seem like an effective countermeasure.


Replies

igregorycayesterday at 11:53 PM

Postinstall scripts have remained an effective attack vector for quite a while – which, ironically, has meant the worm's authors had little incentive to try something else, so it was easier to inoculate yourself. Alas, you're right, it should be pretty simple to bypass this kind of protection, if they haven't already (and seems like they have).

ChocolateGodyesterday at 11:27 PM

Well at runtime one would hope they're not giving their JS app access to their home folder.