@michaelx said:
This a sample project from godot.
Hmm, so if it is from the Godot demo repository, then it is probably not the cause of the issue then.
How google chrome can do such things? Are you talking about exploits?
Yes and no, depending on several factors. There are many different ways it could be possible, but in relation to the temporary folder, it would hinge on how your internet browser has to download and store all of the data for any website you visit on your computer. When you visit a website, your internet browser downloads the HTML, CSS, Javascript, and any other files to a temporary location in memory on your computer.
If the malicious program is part of the data that the web browser downloads when visiting the website, then it would be stored in your temporary folder along with the other website data. From there, all the program has to do is start itself executing, and in theory, the malicious program can access your computer.
Now, I glossed over a LOT of steps and in actuality the process is a bit more complicated, but that is the gist of one method that someone could use to have their malicious program run on the computers of those who visit their webpage. Exploits can make this process easier, and are generally needed to actually get the program in temporary memory executed initially, as often there are safety measure to make sure your browser cannot run programs in temporary memory.
If you are interested in learning more, I would suggest doing additional research and reading what experts in the field have to say. Malware and malicious programs online are a complicated subject, and one that I am by no means an expert on, so please take what I have written with a grain of salt.
I'm scanning all my disks with several anti-virus and anti-ransomware tools now. It will take several days.
After that, I will copy all my data to the external hard drives.
Sounds good! :+1: