Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Sunday February 21 2016, @03:16PM   Printer-friendly
from the ruh-roh dept.

If you downloaded Mint Cinnamon today (for versions of "today" that include February 20th, 2016) you should immediately check the MD5 checksum. Blog Entry here.

From Clem:

We were exposed to an intrusion today. It was brief and it shouldn't impact many people, but if it impacts you, it's very important you read the information below.

Hackers made a modified Linux Mint ISO, with a backdoor in it, and managed to hack our website to point to it.

As far as we know, the only compromised edition was Linux Mint 17.3 Cinnamon edition.

If you downloaded another release or another edition, this does not affect you. If you downloaded via torrents or via a direct HTTP link, this doesn't affect you either.

Finally, the situation happened today, so it should only impact people who downloaded this edition on February 20th.

Apparently the hacked ISOs are hosted on 5.104.175.212 and the backdoor connects to absentvodka.com. Both lead to Sofia, Bulgaria, and the name of 3 people over there.

The comment thread suggests that the ISOs are showing up in other places, and that the Mint site may still not be entirely secure.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by Pino P on Monday February 22 2016, @10:37PM

    by Pino P (4721) on Monday February 22 2016, @10:37PM (#308391) Journal

    There is a very short window of opportunity in which the key has propagated (usually happens within 20 minutes of key publishing), an when people start noticing there is an un-signed-un-trusted key in the key servers with their name on it.

    Provided the program signed with the key has a sufficient audience of highly knowledgeable users.

    its not sufficient to proxy a key server, you have to proxy ALL of them

    Which an ISP-level actor is certainly capable of doing to one or more of its subscribers.

    Then, you have to convince someone to use a URL that clearly does not match the expected domain.

    If you register foobarcdn.com then you can social engineer people into thinking linuxmint.foobarcdn.com is part of the new mirror network that Linux Mint is using.

    Even then, PKI practices that work for a major Linux distribution might not work for a relatively new application with one or a few otherwise professionally unknown developers.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2