pull down to refresh

On the 16th of July, at around 8pm UTC+2, a malicious AUR package was
uploaded to the AUR. Two other malicious packages were uploaded by the
same user a few hours later. These packages were installing a script
coming from the same GitHub repository that was identified as a Remote
Access Trojan (RAT).
The Arch Linux team addressed the issue as soon as they became aware of
the situation. As of today, 18th of July, at around 6pm UTC+2, the
offending packages have been deleted from the AUR.

Seems like we have yet to really have the 9/11 moment, and the ease with which established practices can be catastrophically exploited has not been fully internalized. Or even internalized at all.

reply

terrifying thought!

reply