• AIhasUse@lemmy.world
    link
    fedilink
    arrow-up
    13
    ·
    5 months ago

    Is there a list of the malicious extensions? What should be done if we ha e malicious ones installed?

    • tsonfeir@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      5 months ago

      It sounds like it’s mostly typosquatting. So just check to be sure you didn’t install something like Pretier instead of Prettier

    • Skydancer@pawb.social
      link
      fedilink
      arrow-up
      3
      ·
      5 months ago

      The researchers are releasing the scanning tool they created for people to be able to run against their own installs.

    • InternetPerson@lemmings.world
      link
      fedilink
      arrow-up
      2
      ·
      5 months ago

      As far as I know, there is no such list (yet).

      What should be done:
      Escalate it to the people responsible for IT administration & security in your company or institution. They’ll deal with it.

      But the default step if you suspect of being infected is not to use the device at all until you got a green light for it from the security/admin folks. Power down, disconnect from any networks, either via physical cables or wireless, unplug external storage devices and wait for further info.