Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It will phone home. Don't do it unless it's disconnected from the network. It might also try to spread the infection through other attack vectors, like bluetooth, or trying to break out of the VM.


More likely it would self-destruct to avoid analysis or detection, this is well documented behavior of a number of more sophisticated pieces of malware.


> break out of the VM

I wonder if this has happened yet?


Most definitely. Here is an example: http://1337day.com/exploit/22519


Got anything that doesn't involve the 2d/3d video acceleration? Those are a rather obvious and off-by-default attack surface.






Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: