2024-04-03 at 11:48 PM UTC
lol yeah, people who commit malware always do it using their own name and account
interesting they added a patch to the makefiles rather than straight up updating the code, seems way more suspicious and like they observed memory locations are going to be different depending on environment, platform etc
The following users say it would be alright if the author of this
post didn't die in a fire!
2024-04-07 at 5:42 PM UTC
I like Asian girls.
That's all I have for now.
2024-04-07 at 5:50 PM UTC
Reading up on this, I realize this was actually a very big close call.
This may have even been a government entity.
2024-05-01 at 9:24 PM UTC
This got me paranoid when i went to update linux mint and its name was virginia. I updated to victoria only
2024-05-01 at 9:42 PM UTC
Originally posted by ner vegas
interesting they added a patch to the makefiles rather than straight up updating the code
That was to get the binaries into the compilation process. They hid the binaries as if they were test binaries, due to it being a cryptographic library it would have been sort of normal enough to use a binary file (which would have been a known encrypted file) as a test file. And makefiles are mess that make no sense to me, so no one read it and since everyone hates test anyway it got overlooked. It was only caught when someone noticed SSH login was slower on infected machines.
The following users say it would be alright if the author of this
post didn't die in a fire!
2024-05-11 at 1:54 PM UTC
So what does all this mean in laymans terms?
2024-05-11 at 2:08 PM UTC
Originally posted by Cowboy2013
So what does all this mean in laymans terms?
someone added malware to a dependency for openssh, which is more or less the standard for secure remote access on lunix servers/machines
people caught on before it became a widespread problem, and the way that the code was added made it very unreliable so it was rolled back before it did any real damage
The following users say it would be alright if the author of this
post didn't die in a fire!
2024-05-11 at 10:55 PM UTC
The person with the key corresponding to the one that was inserted could have logged into any of the infected serbians.
It was only caught as the key check slowed down ssh login noticeably.
2024-05-11 at 11:51 PM UTC
There was actually a nice sneaky social engineering part as well. "People" were pushing for the culprit to be in change. They actually fell for it and he/she immediately changed important shit.
2024-05-11 at 11:58 PM UTC
Originally posted by Donald Trump
The person with the key corresponding to the one that was inserted could have logged into any of the infected serbians.
It was only caught as the key check slowed down ssh login noticeably.
the reason why it was running so slowly on those machines is because the patch failed and bricked lzma, not sure what the success ratio is but an in-memory patch like that is only really done on a consistent target platform
The following users say it would be alright if the author of this
post didn't die in a fire!