1 Like
Uh.
Zig mentioned! ![]()
1 Like
Looks like a nothing burger to me.
Why would I care that Zig was used to create some malware?
That Zig was used seems to be almost completely tangential.
I see this mostly as a fun fact that Zig is now popular enough to have been used in malware. I agree it’s nothing consequential in regard to Zig itself, though.
1 Like
Depends if virus checkers start scanning for those standard embedded Zig strings and start false flagging Zig binaries as potential malware. But I guess the strings could be changed in that case.
If they did that, it would be dumb non-sense methodology.
Agreed, seems I misread section 9, there is an and clause in there for the proxy names as well as the Zig strings.