this post was submitted on 21 Sep 2024
33 points (97.1% liked)

Home

464 readers
1 users here now

Lemmy.zip instance discussion.

For all things relating to Lemmy.zip.

Main instance rules apply, with the additional rules below:

founded 1 year ago
MODERATORS
 

Basically title, curious as I know this had been brought up a while ago but never really followed up on the topic

you are viewing a single comment's thread
view the rest of the comments
[–] 0x0@lemmy.dbzer0.com 0 points 1 month ago (3 children)

I don't get what's more concerning about the .zip TLD than any other one.

[–] BehindTheBarrier@programming.dev 17 points 1 month ago

They are just more likely to be scam like, particularly since they can be assumed to be a file at a glance.

Even more deviously, crafty urls like this further hides what you are actually doing, like this:

https://github.com∕kubernetes∕kubernetes∕archive∕refs∕tags∕@v1271.zip

Hover it with your cursor, watch what that actually links too, no markup cheating involved. Anything before the @ is just user information. Imagine clicking that and thinking you downlodaed a tagged build, only to get a malware?

It's not the end of the world, but as a developer it makes great sense to just auto-block it to avoid an incident. The above URL is from this article, which says it's not as big of huge problem too:

https://www.theregister.com/2023/05/17/google_zip_mov_domains/

But it's kind of a death by a thousand cuts to me, because it's another thing with another set of consideration accross the internet ecosystem that one will have to deal with.

[–] perviouslyiner@lemmy.world 7 points 1 month ago

Software that creates hyperlinks whenever it finds text that might be a URL, combined with ubiquitous use of .zip extension for compressed files.

[–] ceiphas@lemmy.world 6 points 1 month ago (1 children)

ZIP Files are a constant source of exploits and Malware.

[–] 0x0@lemmy.dbzer0.com -1 points 1 month ago

Are there any exploits that have ever made use of TLD <-> file extension confusion? This seems really unlikely to help pull off an attack, even if the TLD was .exe, but maybe I'm overly optimistic.