My brother ran into this while car shopping on a reputable Utah based Toyota dealership's website. It was a powershell script that downloaded and executed something from a base64 encoded Bitly URL. Bitly took down the URL so we couldn't see where it was redirecting.
It seems like attackers are embedding this in vulnerable legit websites
I had my pitchfork out and ticket to Jellyfinville in-hand. I read the blog post and saw this myself. I'm wondering if it's a matter of time before they want to screw over my family though
Check out Keychron's mice. They're wireless but you can plug in the cable and use them that way. RGB is a physical button you press to switch which mode you want or turn it off completely. DPI and polling are also physical buttons on the bottom of the mouse.
The only quirks I've noticed are minor. You sometimes go back to your home screen if you try dragging a card too close to the edge of the screen. Sometimes the the lower background elements don't stay in the background and cover pertinent information
I've been running Unraid for over 5 years now and it has been great. I just checked the uptime on it and it's been running for 146 days, 11 hours, 31 minutes. I should probably check for updates...
I used to run a Threadripper 2950x with 64GB of RAM as my main system and built a new PC when Ryzen 5000 came out and the Threadripper system became the Unraid server. I threw it into a 24-bay, 4U Supermicro CSE-846 with a LSI SAS9211-8I HBA and an extra RTX 3060 I had for hardware transcoding Plex. I have 64TB of storage at the moment with no drive being larger than 8TB. Having 24 bays is nice for that. The server is in a rack in my cellar so sound isn't an issue for me. I've thought about switching to an Epyc setup just to have IPMI built into the motherboard instead of buying a separate KVM device
I have 8 containers and 5 VMs running. I have multiple VLANs setup on my UDM Pro and Juniper switches. A camera VLAN, one for IoT devices for Home Assistant. A Tailscale exit node container is all I use to access the server remotely. I also have a Rustdesk server VM setup for private remote desktop
There's zero attempt to hide the branding on the actual product. Nintendo logo on the main shell, GBC sticker on the back. Hell, they even include the "Questions and Service" 1-800 number sticker for the back
My brother ran into this while car shopping on a reputable Utah based Toyota dealership's website. It was a powershell script that downloaded and executed something from a base64 encoded Bitly URL. Bitly took down the URL so we couldn't see where it was redirecting.
It seems like attackers are embedding this in vulnerable legit websites