this post was submitted on 18 Jul 2025
343 points (99.7% liked)

Linux

56547 readers
597 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
 

On the 16th of July, at around 8pm UTC+2, a malicious AUR package was uploaded to the AUR. Two other malicious packages were uploaded by the same user a few hours later. These packages were installing a script coming from the same GitHub repository that was identified as a Remote Access Trojan (RAT).

The affected malicious packages are:

  • librewolf-fix-bin
  • firefox-patch-bin
  • zen-browser-patched-bin

The Arch Linux team addressed the issue as soon as they became aware of the situation. As of today, 18th of July, at around 6pm UTC+2, the offending packages have been deleted from the AUR.

We strongly encourage users that may have installed one of these packages to remove them from their system and to take the necessary measures in order to ensure they were not compromised.

Follow up

There are more packages with this malware found.

  • minecraft-cracked
  • ttf-ms-fonts-all
  • vesktop-bin-patched
  • ttf-all-ms-fonts

What to do

If you installed any of these packages, check your running processes for one named systemd-initd (this is the RAT).

The suspicious packages have a patch from this now-inaccessible Codeberg repo: https://codeberg.org/arch_lover3/browser-patch

The Arch maintainers have been informed of all this already and are investigating.

you are viewing a single comment's thread
view the rest of the comments
[–] Tundra@sh.itjust.works 140 points 2 days ago (4 children)

this is going to increase in frequency as linux gains popularity

[–] DirkMcCallahan@lemmy.world 34 points 2 days ago (4 children)

This is why I felt uncomfortable when I first switched to Linux and kept reading that I didn't need to worry about viruses as long as I didn't click on dodgy links and only installed from trusted sources. I'm sure I'm betraying my lack of security knowledge here, but that always seemed a bit too easy.

[–] mark@social.cool110.xyz 121 points 2 days ago (4 children)

@DirkMcCallahan @Tundra The AUR isn't a trusted source, but most of the the Arch cult forget to mention that.

[–] copygirl@lemmy.blahaj.zone 110 points 2 days ago* (last edited 2 days ago) (3 children)

most of the the Arch cult forget to mention that

The "Arch cult's" holy book, the ArchWiki, states the following pretty clearly:

Warning: AUR packages are user-produced content. These PKGBUILDs are completely unofficial and have not been thoroughly vetted. Any use of the provided files is at your own risk.

Mention of one's use of the AUR for their needs doesn't need to come with a disclaimer.
People who don't read or don't use their brain are going to keep not doing so, regardless.

[–] tehn00bi@lemmy.world 25 points 2 days ago (1 children)

Arch is not responsible for idiots.

[–] irotsoma@lemmy.blahaj.zone 2 points 1 day ago

Arch is not recommended for idiots either. If you want cutting edge, you accept the risks. Works that way with all tech.

[–] FuckBigTech347@lemmygrad.ml 1 points 1 day ago

I feel like the people who don't look at PKGBUILDs and install hooks and just hit Y on everything are the same people who spam "Next" and "Accept" on Windows Installers from random websites.

[–] caseyweederman@lemmy.ca 16 points 2 days ago (1 children)

Half the posts on the Internet are people replying to requests for help with the message "read the wiki, the aur isn't a trusted source, dummy"

[–] muusemuuse@sh.itjust.works -3 points 2 days ago (3 children)

Why do we have the AUR anyway?

[–] helix@feddit.org 16 points 2 days ago (1 children)

Because it's convenient and a good way to start to write PKGBUILDs quickly without becoming a proper package maintainer.

[–] muusemuuse@sh.itjust.works 2 points 2 days ago

Isn’t that like how alpinelinux’s community repository works too?

[–] teawrecks@sopuli.xyz 2 points 1 day ago

It's meant to be a convenience for people who know what they're doing.

[–] caseyweederman@lemmy.ca 2 points 1 day ago

It's super useful as long as you understand that it is just a big bucket of scripts that just anybody can push

[–] teawrecks@sopuli.xyz 3 points 1 day ago

You can't even install from AUR using pacman directly. You either need to makepkg them manually, or use an extra AUR compatible package manager like yay. It's made as clear as possible to arch users that the AUR is not vetted in any way, it's just for convenience.

[–] Fecundpossum@lemmy.world 52 points 2 days ago (1 children)

The AUR, key words “user repository” is a specific weak point. It doesn’t have the same level of oversight that the main arch repo has. Stick to main repos and verified flatpaks and it’s very unlikely that you’d ever be compromised.

Linux isn’t perfect, but it’s certainly better than windows where you just download executables willy nilly to install your software.

[–] HaraldvonBlauzahn@feddit.org 2 points 2 days ago

BTW python's package index has roughly the same problem - but a far less technical, experienced and critical user base. NPM has this problem since years.

Expect these problems to rise with every percent more of new Linux users which never learned the difference between opening / viewing untrusted data, and running untrusted code, because Windows basically ignores this essential concept and Android tries to solve that with sandboxing each app.

[–] Nibodhika@lemmy.world 20 points 2 days ago (1 children)

That is sound advice, the AUR is most definitely not a trusted source though. For the normal arch repos the people who put the stuff there are known, they work for the project, you're as likely to get malware from one of those as you are to read an article bashing gamespot in gamespot, the people in charge of putting the packages there are the ones with more vested interest in things working so they won't knowingly introduce malicious code (plus it's a handful of people who know each other by first name).

The AUR is a different story, because anyone can put stuff there it's very easy to have malicious code end up there. It doesn't happen that often because most of the time it's fairly obvious and it gets flagged straight away, plus if people start doing that people will migrate away from the AUR, so it's a high risk low reward situation. But as more and more people start to use Arch derivatives that come with the AUR enabled without understanding any of this it becomes a more rewarding thing to exploit.

[–] Dudewitbow@lemmy.zip 10 points 2 days ago (1 children)

like git repositories, AUR in its name itself says what it is, a User repository. its trust like repositories is fully based on how much you trust the user who uploaded it

[–] caseyweederman@lemmy.ca 2 points 2 days ago (1 children)

In fact, most PKGBUILDs just clone git repos and build them

[–] juipeltje@lemmy.world 2 points 2 days ago

Yeah i think the aur is pretty much completely source based, with the exception of bin packages where they pull down a precompiled binary.

[–] NuXCOM_90Percent@lemmy.zip 10 points 2 days ago

Yeah. The I'm A Mac crowd had the same problem... god damn it, two or three decades ago.

As market share increases, platforms become a much bigger target for malware. And a lot of the "I don't need to run virus scans" crowds learn the hard way.

Its the same with open source. Obviously NOBODY around here would parrot this bullshit, but there is the idea that because something is FOSS it is safe. Code is only as safe as code review and there have been a few high profile cases of social engineering to get malicious code past even fairly rigorous review. Let alone "Well, that script is FOSS so somebody probably reviewed it" that we see so often.

[–] nsrxn@scribe.disroot.org 3 points 2 days ago

I use Debian btw

[–] bacon_pdp@lemmy.world 2 points 2 days ago (1 children)

Only for distributions which don’t do reproducible builds and require full and complete corresponding source code under an FSF approved license.

If you choose to download binary blobs, good fucking luck.

[–] elvith@feddit.org 4 points 2 days ago (1 children)

As if everyone were to read every single line of source code, though. This just increases the chances of it being discovered.

[–] nsrxn@scribe.disroot.org 2 points 2 days ago (2 children)

you don't need to read every line if you trust your package maintainers

[–] elvith@feddit.org 3 points 2 days ago

True, but AUR isn’t official but provided by other users

[–] bacon_pdp@lemmy.world 0 points 2 days ago

Or if a handful of paranoid people read the code for a distribution and publicly discuss everything that they find (it only would take 12 crazies in the whole world)