This is a really hard way to learn to keep your personal accounts off of work devices. That has to hurt.
Technology
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
lorem ipsum
Why not relegate Windows to a VirtualBox environment? That way you can just turn it off when you're not using it and not need to reboot. You can use the guest additions and everything to get your proper native screen resolution and pass through USB devices etc.
You can also get a KVM (and second machine) and keep them fully seperate that way. Some rootkits may still be able to infect both of your installs if you dual boot. Just depends on your paranoia level.
This is the first time you noticed you caught a malware. I wouldn't be so confident about never having caught one and Im way more paranoid than you. This one was just really noisy.
lorem ipsum
Those are just some uses of malwares. It's not always that noticeable.
You can be the most diligent, tech-savvy, cyber warfare general of nato and all it takes is one second of not thinking and a click...
I totally never accidentally fell for the spam awareness email at Monday at 8am before my caffeine to hangover ratio was balanced while being the admin.
Was it an actual zip file that managed to exploit some vulnerability in the program that opened it or was it something like "filename.zip.exe" and windows hid the .exe part?
Thanks for sharing. Sorry that happened to you and hope you got everything back in order.
Was it an .exe file that looked like a zip file that you opened? Or was there an executable in the zip file?
A cautionary tale from the digital trenches. Good luck with the cleanup.
This might have been avoidable using a software firewall that doesn't defacto allow outbound connections.
That's a big maybe.
And here I am, emailing password protected zip files to people when the documents are not to be scanned by my mail provider.
Wait so you were logged into sensitive accounts? If you weren't, then your accounts wouldn't have been as compromised?
lorem ipsum
So I'm guessing they grabbed the %appdata% for Chrome and were able to get the passwords out of that?
lorem ipsum