Thanks for being straightforward and quick to let us know. If you’ve been affected by this, please do let us know. If more efforts are made to attack our project and if the goal is to hurt us, we’ll get in touch with authorities and security firms to confront the people behind this. What we don’t know is the motivation behind this attack. We don’t know their roles in this, but if we ask for an investigation, this is where it will start. The hacked ISOs are hosted on 5.104.175.212 and the backdoor connects to .īoth lead to Sofia, Bulgaria, and the name of 3 people over there. We took the server down while we’re fixing the issue. Change your passwords for sensitive websites (for your email in particular).Reinstall the OS or format the partition.If you burnt it to USB, format the stick. Once in the live session, if there is a file in /var/lib/man.cy, then this is an infected ISO.ĭelete the ISO. If you still have the burnt DVD or USB stick, boot a computer or a virtual machine offline (turn off your router if in doubt) with it and let it load the live session. If you still have the ISO file, check its MD5 signature with the command “md5sum yourfile.iso” (where yourfile.iso is the name of the ISO). If you downloaded via torrents or via a direct HTTP link, this doesn’t affect you either.įinally, the situation happened today, so it should only impact people who downloaded this edition on February 20th. If you downloaded another release or another edition, this does not affect you. Hackers made a modified Linux Mint ISO, with a backdoor in it, and managed to hack our website to point to it.Īs far as we know, the only compromised edition was Linux Mint 17.3 Cinnamon edition. It was brief and it shouldn’t impact many people, but if it impacts you, it’s very important you read the information below.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |