this post was submitted on 18 Jul 2025
73 points (100.0% liked)

Linux

8500 readers
283 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS
 

On the 16th of July, at around 8pm UTC+2, a malicious AUR package was uploaded to the AUR. Two other malicious packages were uploaded by the same user a few hours later. These packages were installing a script coming from the same GitHub repository that was identified as a Remote Access Trojan (RAT).

The affected malicious packages are:

  • librewolf-fix-bin
  • firefox-patch-bin
  • zen-browser-patched-bin

The Arch Linux team addressed the issue as soon as they became aware of the situation. As of today, 18th of July, at around 6pm UTC+2, the offending packages have been deleted from the AUR.

We strongly encourage users that may have installed one of these packages to remove them from their system and to take the necessary measures in order to ensure they were not compromised.

According to the gamingonlinux discord, the following packages are also suspected to be compromised:

https://aur.archlinux.org/pkgbase/minecraft-cracked/

https://aur.archlinux.org/pkgbase/ttf-ms-fonts-all/

https://aur.archlinux.org/pkgbase/vesktop-bin-patched/

https://aur.archlinux.org/pkgbase/ttf-all-ms-fonts/

If you have any of these packages installed, immediately delete it and check your system processes for a process called systemd-initd (this is the RAT).

Here is an analysis of the malicious payload: https://www.virustotal.com/gui/file/d9f0df8da6d66aaae024bdca26a228481049595279595e96d5ec615392430d67

top 9 comments
sorted by: hot top controversial new old
[โ€“] NaibofTabr@infosec.pub 19 points 2 days ago (2 children)

This is an increasing problem and I'm not sure how the open source community is going to deal with it. It's been a big problem with NPM packages and also Python libraries over the past five years. There's a bunch of malicious typo-squatting stuff in many package repositories (say you want libcurl but you type libcrul, congratulations it's probably there and it'll probably install libcurl for you and bring a fun friend along).

Now with AI slop code getting submitted, it's not really possible to check every new package upload. And who's going to volunteer for that work?

[โ€“] 30p87@feddit.org 14 points 2 days ago* (last edited 2 days ago) (1 children)

Obviously, AI is going to also fix the problem ๐Ÿคก

[โ€“] NaibofTabr@infosec.pub 8 points 2 days ago

"We have investigated ourselves and found no problem."

[โ€“] Ptsf@lemmy.world 3 points 1 day ago

Wikipedia does a half decent job, we should probably adopt a model of their policies for open source code intended to be shared in such ways.

[โ€“] Nebula@fedia.io 7 points 1 day ago

Almost shat my pants a little, because I thought it was librewolf-bin.

[โ€“] thingsiplay@beehaw.org 6 points 2 days ago (1 children)

Why is this not found in the official news for Archlinux? https://archlinux.org/news/

[โ€“] pyssla@quokk.au 14 points 2 days ago* (last edited 2 days ago) (1 children)

Because, and I quote:

"Warning: AUR packages are user-produced content. These PKGBUILDs are completely unofficial and have not been thoroughly vetted. Any use of the provided files is at your own risk."

Thankfully, there's a mailing list that covers issues like these. Heck, OP's PSA was probably originally propagated from there.

[โ€“] thingsiplay@beehaw.org 3 points 1 day ago

I know its user produced content. But there are still rules that are enforced by Archteam and they host and link to it. And why not tell people about security issues? They could at least tell people in the news, so we can act accordingly. This is super disappointing. Is there any trustworthy RSS feed that covers this?

[โ€“] Maiq@lemy.lol 3 points 2 days ago

Thanks for the heads up!