As in title. What’s your experience with it? If something isn’t executable, then it has to exploit vulnerability in order to run anything malicious. But does it happen often with mp4, mkv and other files like mp3 or epub?

I assume that if I use updated linux, then I’m mostly safe?

  • Brickfrog@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    28
    arrow-down
    2
    ·
    1 year ago

    But does it happen often with mp4, mkv and other files like mp3 or epub?

    Typically is not possible. Those media files are basically just data files (e.g. like a .txt text file) so media players normally do not look for anything to execute inside them. And frankly people should avoid any media player attempting to execute random code found in media files.

    Case in point, the old Windows Media Player + old .wmv files used to be able to direct people to random websites to download/execute malware. Leave it to Microsoft to somehow turn a movie file into malware https://security.stackexchange.com/questions/106188/can-a-rogue-wmv-file-hijack-windows-media-player

    • plexnose@geddit.social
      link
      fedilink
      English
      arrow-up
      10
      ·
      1 year ago

      It’s not about a media player ‘attempting to execute random code’ - an exploit is found which lets it run a command that it shouldn’t. You used to be able to jailbreak phones by loading a .pdf file that used an exploit to gain root privileges and execute code. It wasn’t a feature of the PDF reader. It was a bug that could be exploited when a specific string of characters was entered to effectively crash the pdf reader and let it run its own code instead.

      A txt could easily contain malware - any file could.

      • miah@midwest.social
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 year ago

        PDF is a complicated format, and the hacking vectors are often thanks to embedded javascript, or vulnerabilities in the parsing libraries.

        ‘avi’ is technically a container format, kind of like ‘zip’, it can contain more than video/audio.

        That said, I’ve been pirating movies since the mid 1990’s and haven’t gotten hacked through a .avi/.mkv/etc. The ‘bad stuff’ was always in a obvious .exe/.bat or some sort of executable, but sometimes named to exploit people, eg ‘foomovie.avi.exe’.

        If in doubt, run your videos using mplayer on Linux and not on Windows, most of that stuff tends to target the easier to exploit and more commonly deployed systems, eg Windows.

        • plexnose@geddit.social
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 year ago

          Yesh - the huge majority of malware in relation to piracy is from people deliberately running ‘setup.exe’ from some untrusted source, ignoring or overriding AV warnings and then wondering what went wrong. Its not from movie files and it certainly not from movie files on Linux.

      • Pulp@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        True. This is something to worry when securing the network of a large corporation & governments. Not for the average pirate

    • scutiger@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      More likely is a specific file-naming trick that lets you use right-to-left writing to make a file look like something it’s not. When it’s written backwards, you can make iva.scr look like rcs.avi, and the target will just think it’s a video file when it’s actually an executable. If you’re not paying attention, you may not notice that Windows Explorer shows a .avi extension but lists the file as an executable. Hell, if you open the file directly from your torrent app, it may not even list the file type at all. In effect, it’s not hiding a payload in a video file, just disguising the payload as a video file.

  • AlmightySnoo 🐢🇮🇱🇺🇦@lemmy.world
    link
    fedilink
    English
    arrow-up
    27
    arrow-down
    3
    ·
    1 year ago

    I assume that if I use updated linux, then I’m mostly safe?

    I don’t know why Linux users think they’re completely immune to malware. Yes it’s very unlikely that something gains root access if you run it without super-user privileges, but that program can still access your home folder and look at all your private data.

    • Xirup@lemmy.one
      link
      fedilink
      English
      arrow-up
      33
      arrow-down
      1
      ·
      edit-2
      1 year ago

      Probably because the vast majority of the pirate software available is for Windows, and there’s no way that program will run natively on Linux.

      I mean, if I download a movie from freevirus(dot)com it is most likely that the movie will be a .mp4.exe and not a .mp4.sh.

      • kent_eh@lemmy.ca
        link
        fedilink
        English
        arrow-up
        10
        ·
        1 year ago

        And even if it is a .sh file, you’d still have to change it’s permissions before it could do anything

      • infeeeee@lemm.ee
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        1 year ago

        If wine installed, there is a big chance that the exe can be started by simply doubleckicking on it. A lot of windows programs can run in wine without any specific setup, e.g. a basic crypto miner.

        • Xirup@lemmy.one
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          1 year ago

          That’s why I said natively.

          I agree with what you said, but it’s also important to clarify that a lot, but a lot of pirate Windows software doesn’t run on Linux with just two clicks, even with Wine, it doesn’t look like it but check c/LinuxCrackTips.

          Games like Forza Horizon 5 or Monster Hunter World (just to mention two examples I have in mind) need to run under a specific Wine prefix that is usually not as simple as searching on internet which prefix to use, it’s pure proof and pain of trying until the game miraculously opens, and many times if it’s not the problem of the prefix itself it’s because you have to add specific environment variables, sometimes you need specific dependencies that you don’t have any idea, sometimes said dependency is DX11

          I think that even sometimes is worse, Days Gone for example ran with lag because I used “system sync” and not “esync” and here it wasn’t even the prefix problem, it was of that, nobody told me, I had to try it myself.

          And not to mention that when you want to download pirated games on Linux it’s best that they’re a crack made by Empress, since she/he has to work specifically with Proton binaries to make it work on the Steam Deck, look Resident Evil 4 Remake where Empress had to create a crackfix specifically for Linux (better Linux support than Capcom herself, heh) because the game to Linux users under Wine/Proton threw an error, but the same game on Windows didn’t suffer from that.

          And finally, there are programs that just don’t run because “Your GPU isn’t supported”, that mean that the program it’s not detecting the driver, so I find it hard for something like a cryptominer to work in Linux under Wine, but of course it can happen.

          Personally I use Bottles, since Bottles allows me to manage my prefixes and their processes in an orderly and clean way with graphical interface and within a flatpak container (which I know, it is not necessarily the safest thing, but it is inside the Wine container, and the Flatpak container that gives me more security) but within Bottles I can close all the programs and processes that a prefix has open with a click, if I had Wine installed at system level where the programs ran to two clicks I actually would worry too much because I would not have the same level of management as in Bottles.

    • Transient Punk@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      8
      ·
      1 year ago

      Eh. I only ever open pirated movie/video files from within a docker container (Plex server) running in a VM. I don’t think I have much to worry about.

    • plexnose@geddit.social
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 year ago

      We don’t - but the risk is minuscule compared to windows. The actual chance of finding some working Linux malware in the wild is practically zero.

  • DudeBoy@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    ·
    1 year ago

    To my knowledge, Ive never downloaded any malware from a pirated movies/music/books. The possibility is always there when downloading from unverified sources. That said if you stuck to the sites listed in the wiki you should be fine.

  • Flashback956@feddit.nl
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    1 year ago

    Very unlikely but not impossible. Always check the comments when downloading torrents to make sure they are legit.

  • Moonrise2473@feddit.it
    link
    fedilink
    English
    arrow-up
    12
    ·
    1 year ago

    it’s almost impossible that some state sponsored attacker will waste a 0day to attack random people downloading the latest movie from torrent. And when it happens all the news will talk about it

    • Forceuser@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      State sponsored hackers are a very small percentage of the threat actors out there. Also - they don’t need to exploit a zero day if you are willingly launching something on your machine.

  • Pulp@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    12
    ·
    1 year ago

    Someone with that kind of exploit would likely try to target something valuable like big companies, rich people, governments and not you.

  • BatteryBunny@kbin.social
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    1 year ago

    As far as anyone knows there is no way to put malicious code in a video file. What you should be worrying about is how you get those files.

    If you’re torrenting then you have to worry about copyright trolls contacting your ISP. If you’re using file-hosting websites just vet your downloads and make sure you don’t run any sketchy executable files. And it should go without saying, but don’t escalate privileges for unknown programs.

    • Homer@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      1 year ago

      Not entirely true as you can put malicious code in anything. The bigger question is whether or not your video player is susceptible to that type of attack. I would say the likelihood is low but not impossible. The best defense would be to make sure whatever video player you do use is fully up to date.

  • tiredofpegging@lemmynsfw.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    I don’t think I’ve seen malware associated with video content since the Limewire days. I think the closest I’m aware of in recent memory was some talk of malware coming out of some of the “fake” Pirate Bay proxies, but even then I’m not sure it was associated with video.

    Any halfway respectable tracker public or private you should be fine.

  • Bear@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I had dodged stuff before when I downloaded software, I’d be weary of anything you give permission to run on your pc. But for movies and music etc, I check what files I’m getting. While this doesn’t eliminate the risk of malware cased in a .mkv, I only download on a Linux VM, and usually first open on MacOS.