Jump to content

Recommended Posts

  • ExTS Admin
Posted

http://img.photobucket.com/albums/v708/starbuck50/mate-desktop-100632307-orig_zps64jrkjem.png

 

A hacker modified a version of Linux Mint to contain a backdoor, then hacked the project's website to trick users into downloading the malicious version.

 

A hacker has broken into the website of one of the most-popular Linux version and pointed users to malicious download links that contained a "modified" version of the software.

 

The surprise announcement was made Saturday, shortly after the breach was detected.

 

In a blog post, Clement Lefebvre, head of the Linux Mint project -- said to be the third most-popular version of the open-source operating system after Ubuntu and Fedora -- confirmed the breach.

 

"Hackers made a modified Linux Mint ISO, with a backdoor in it, and managed to hack our website to point to it," he said.

 

"As far as we know, the only compromised edition was Linux Mint 17.3 Cinnamon edition," he added. "If you downloaded another release or another edition, this does not affect you.

If you downloaded via torrents or via a direct HTTP link, this doesn't affect you either."

 

Lefebvre said only downloads from Saturday were compromised.

 

Shortly after the announcement, the project's website was pulled offline.

 

Lefebvre said the hacked download image files -- used to install the Linux operating system -- were hosted on a server based in Bulgaria.

Micah Lee, security engineer and reporter at The Intercept, posted on his blog with more details, saying that the hacker loaded the Tsunami botnet malware on the disk image. Tsunami allows an attacker remote access to an infected machine.

 

Lefebvre said in this case the backdoor connects to "absentvodka.com," which at the time of writing does not appear to be online.

 

It's thought the Linux distro's website and forum was stolen in the breach.

 

http://img.photobucket.com/albums/v708/starbuck50/torscreenshot_zpsjolzia5e.png

A screenshot of the alleged dark-web listing.

 

Lefebvre confirmed the site was hacked through its outdated WordPress installation, but he denied that using HTTPS site encryption would have mitigated the attack.

 

"You'd be served the exact same hacked information via HTTPS," he said.

 

Lee also criticized the site's lack of encryption, arguing that the checksums on the site could easily be modified by an attacker to trick the user into downloading a verified build.

 

"If a hacker can hack the website to modify the download link, they can modify the checksum at the same time to match their malicious download," he said.

 

"Verifying is PGP signatures is more complicated and harder to explain than comparing checksums, but it's actually secure. It's the only way to be sure that a Linux installer ISO you download hasn't been tampered with since the image was built by the developers," he added.

 

CSO's Steve Ragan found an ad on a dark web site claiming to have a "full forum dump" of the site, with a going rate of about 0.19 bitcoin, or about $83 per download. (We were able to verify the listing exists, but could not speak to its authenticity.)

 

 

Source:

http://www.zdnet.com/article/linux-mint-website-hacked-malicious-backdoor-version/

Member of:

UNITE

  • Replies 0
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

Top Posters In This Topic

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...