Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Unintentionally spreading malware is bad enough, but blindly dismissing reports as false positives is really bad. Verify first.


No, you do not understand Help Desk Level I Troubleshooting.

The steps are invariably:

- Turn it off then turn it back on again

- Force stop, clear your cache and cookies

- Disable AV and firewall then reinstall

If the user cannot be induced to follow this simple script, then we can never move past the most basic of troubleshooting sessions.

Because everyone knows that troubleshooting is about covering up the symptoms rather than diagnosing the root cause.


Have you worked at a Help Desk? It’s shocking how often those dumb questions reveal what’s really going on. Fake but realistic examples:

- chrome doesn’t work! (It was actually Microsoft word)

- my printer won’t print! (Out of paper)

- your program keeps crashing! (No, that’s the os reminding you of a security update)


They do happen all the time, though. One piece of software I work on frequently fails in CI when a dependency updates because it often triggers defender's automated "new threat" detection system some days after it's released. After another week or so it's fine, but it's a pain the neck.


Verify how?

Go look at the "build log" in your compromised jenkins server and download the (already compromised) build artifact and make sure it matches the mega.co.nz file?

Do you expect the average software engineer to be able to look at a .exe, pull up a disassembler, and know that all the assembly maps back to the source code?


The person who originally reported it was not super technical so if your software engineer can’t reproduce the customers steps to see the same error then you probably need better software engineers.


You say "Jenkins server" as if there's a CI setup involved.

I wouldn't be surprised if, in many cases, these companies just have whoever touched the code last run a build on their computer and ship that. (Which probably explains how some of the malware got there.)


It's not hard to replicate downloading a zip archive from the official location and find someone knowledgeable to look at it if you aren't yourself. A non-software-engineer did just that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: