
Arch Linux has pulled three malicious packages uploaded to the Arch Person Repository (AUR) have been used to put in the CHAOS distant entry trojan (RAT) on Linux gadgets.
The packages have been named “librewolf-fix-bin”, “firefox-patch-bin”, and “zen-browser-patched-bin,” and have been uploaded by the identical consumer, “danikpapas,” on July 16.
The packages have been eliminated two days later by the Arch Linux workforce after being flagged as malicious by the group.
“On the sixteenth of July, at round 8pm UTC+2, a malicious AUR bundle was uploaded to the AUR,” warned the AUR maintainers.
“Two different malicious packages have been uploaded by the similar consumer a couple of hours later. These packages have been putting in a script coming from the identical GitHub repository that was recognized as a Distant Entry Trojan (RAT).”

Supply: BleepingComputer
The AUR is a repository the place Arch Linux customers can publish bundle construct scripts (PKGBUILDs) to automate the method of downloading, constructing, and putting in software program that’s not included with the working system.
Nevertheless, like many different bundle repositories, the AUR has no format evaluation course of for brand new or up to date packages, making it the consumer’s duty to evaluation the code and set up scripts earlier than constructing and putting in the bundle.
Though all of the packages have now been eliminated, BleepingComputer discovered archived copies of all three, indicating that the risk actor started submitting the packages at 18:46 UTC on July 16.
Every bundle, “librewolf-fix-bin“, “firefox-patch-bin“, and “zen-browser-patched-bin,” all contained a supply entry within the PKGBUILD file known as “patches” that pointed to a GitHub repository underneath the attacker’s management: https://github.com/danikpapas/zenbrowser-patch.git.
When the BUILDPKG is processed, this repository is cloned and handled as a part of the bundle’s patching and constructing course of. Nevertheless, as a substitute of being a professional patch, the GitHub repository contained malicious code that was executed through the construct or set up part.
This GitHub repository has since been eliminated, and the .git repository is now not obtainable for evaluation.
Nevertheless, a Reddit account started responding to numerous Arch Linux threads on the platform at the moment, selling these packages on the AUR. The feedback have been posted by an account that seems to have been dormant for years and certain compromised to unfold the malicious packages.
Arch customers on Reddit rapidly discovered the feedback suspicious, with one in every of them importing one of many parts to VirusTotal, which detects it because the Linux malware known as CHAOS RAT.
CHAOS RAT is an open-source distant entry trojan (RAT) for Home windows and Linux that can be utilized to add and obtain recordsdata, execute instructions, and open a reverse shell. Finally, risk actors have full entry to an contaminated machine.
As soon as put in, the malware repeatedly connects again to a command and management (C2) server the place it waits for instructions to execute. On this marketing campaign, the C2 server was positioned at 130.162[.]225[.]47:8080.
The malware is usually utilized in cryptocurrency mining campaigns however may also be used for harvesting credentials, stealing knowledge, or conducting cyber espionage.
Because of the severity of the malware, anybody who has mistakenly put in these packages ought to instantly test for the presence of a suspicious “systemd-initd” executable operating on their pc, which can be positioned within the /tmp folder. If discovered, it needs to be deleted.
The Arch Linux workforce eliminated all three packages by July 18th at round 6 PM UTC+2.
“We strongly encourage customers which will have put in one in every of these packages to take away them from their system and to take the mandatory measures so as to guarantee they weren’t compromised,” warned the Arch Linux workforce.
