Zig malware

1 Like

Uh.

:triangular_flag:Zig mentioned! :chequered_flag:

1 Like

Looks like a nothing burger to me.
Why would I care that Zig was used to create some malware?
That Zig was used seems to be almost completely tangential.

I see this mostly as a fun fact that Zig is now popular enough to have been used in malware. I agree it’s nothing consequential in regard to Zig itself, though.

1 Like

Depends if virus checkers start scanning for those standard embedded Zig strings and start false flagging Zig binaries as potential malware. But I guess the strings could be changed in that case.

If they did that, it would be dumb non-sense methodology.

Agreed, seems I misread section 9, there is an and clause in there for the proxy names as well as the Zig strings.