@infosec_jcp 🐈🃏 done differently<p><span class="h-card" translate="no"><a href="https://tldr.nettime.org/@tomjennings" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tomjennings</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@smellsofbikes" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>smellsofbikes</span></a></span> </p><p>I found this same thing on wish .com, don't go there, advertised as ' usb3 ', it was actually usb2, but had a blue ' usb3 ' end to ' sell the fraud '.</p><p>It was malware infested with windows malware. Cray cray cheap though. Ended up being four usb2, total generics in a config kinda like this microSD card setup.</p><p>They didn't anticipate me ripping it apart, fixing the solder points, ditch their whole shell since the firmware had burned in malware also, for persistent reinfections, obviously from china. Cheapest crap I've ever bought to ' do a self study on chinese malware ' cost wise though.</p><p>ProTip about Wish .Com:</p><p>You can just surf & find the software sold there WITHOUT buying a SINGLE thing since most of it IS infected as Windows, MacOS, Android & IOS apps that go along with their side project, <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> driven, zero humans in the loop customer service debacle of a company ' google engineer side project owned .com '.</p><p>A fun distraction during the pandemic though!</p><p><a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a>'d tales, 💯 ☣️🔍📝🧐</p><p><a href="https://infosec.exchange/tags/infosec_jcp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec_jcp</span></a> <a href="https://infosec.exchange/tags/investigations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>investigations</span></a> into <a href="https://infosec.exchange/tags/WishCom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WishCom</span></a> </p><p>(Don't buy hardware or software from there. It's <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> infested cr☣️p from a <a href="https://infosec.exchange/tags/GoogleEngineers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleEngineers</span></a> side project.)<br>☣️<br>👇<br><a href="https://en.wikipedia.org/wiki/Wish_(company)" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Wish_(co</span><span class="invisible">mpany)</span></a></p><p>ProTip#2:</p><p>_Anyone_ in the <a href="https://infosec.exchange/tags/Fortune1000" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortune1000</span></a> or below finds ANY employee or contractor buying this hardware and bringing ANY of this KNOWN infected crap to their work should be FIRED, IMMEDIATELY, by their <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> department, 💯. Check their credit card for receipts*! </p><p>* Especially <a href="https://infosec.exchange/tags/GoogleEngineers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleEngineers</span></a> 💯🧐</p>