NordVPN Takes on Phone Scammers with Scam Call Protection Feature
NordVPN is taking the fight to scammers.
A new pest appears in the Arch User Repository.
The Arch User Repository (AUR) is a popular resource for Arch Linux users. It hosts user-submitted build scripts for software not included in the official repositories. While its openness provides flexibility, it also introduces vulnerabilities.
Merely a few weeks ago, AUR was hit by a RAT that disguised itself inside browser-related packages. It infected systems during the install process using a malicious GitHub link embedded in the PKGBUILD script.
Now, a similar case has emerged, where a new package pretending to be Google Chrome has been caught carrying another hidden RAT script.
What's Happening: A file named google-chrome-stable
had made its way into the AUR, uploaded by a newly created user account called "forsenontop", who had no other activity other than this.
According to Linuxiac, the package used an .install
script to run a Python command that downloaded and executed remote code each time the Chrome browser was launched. The code runs silently in the background, with no visible signs to the user.
Luckily, the package was quickly removed by AUR admins once it was reported by a user.
What Now: Like earlier, if you suspect that you might be affected, then you can first run the following command to see whether the malicious package is on your system:
pacman -Qs google-chrome-stable
If this package shows up in your system, then remove it immediately with:
sudo pacman -Rns google-chrome-stable
And I will say this again: always make sure your system is up to date and only install packages from trusted sources.
Via: Linuxiac
Suggested Read 📖
Stay updated with relevant Linux news, discover new open source apps, follow distro releases and read opinions