SIKKERHEDSADVARSEL:Bagdør i Linux Mint - 20. feb. 2016 downloads

Har du spørgsmål til andre systemer end Ubuntu kan du stille dem her.
Indlæg: 5095
Tilmeldt: 27. apr 2008, 02:16
IRC nickname: lars_t_h
Geografisk sted: Fyn

SIKKERHEDSADVARSEL:Bagdør i Linux Mint - 20. feb. 2016 downloads

Indlæg af lath »

Via Full Circle Magazine har jeg fået en email om at Linux Mint har fået en bagdør:
Du har kun grund til at være bekymret hvis det du har downloaded et Linux Mint Cinnamon ISO den 20. februar 2016, og så installeret det ISO.

Beskeden fra upstream (Linux Mint), Link
Beware of hacked ISOs if you downloaded Linux Mint on February 20th!
I’m sorry I have to come with bad news.

We were exposed to an intrusion today. It was brief and it shouldn’t impact many people, but if it impacts you, it’s very important you read the information below.

What happened?

Hackers made a modified Linux Mint ISO, with a backdoor in it, and managed to hack our website to point to it.

Does this affect you?

As far as we know, the only compromised edition was Linux Mint 17.3 Cinnamon edition.

If you downloaded another release or another edition, this does not affect you. If you downloaded via torrents or via a direct HTTP link, this doesn’t affect you either.

Finally, the situation happened today, so it should only impact people who downloaded this edition on February 20th.

How to check if your ISO is compromised?

If you still have the ISO file, check its MD5 signature with the command “md5sum yourfile.iso” (where yourfile.iso is the name of the ISO).

The valid signatures are below:

6e7f7e03500747c6c3bfece2c9c8394f linuxmint-17.3-cinnamon-32bit.iso
e71a2aad8b58605e906dbea444dc4983 linuxmint-17.3-cinnamon-64bit.iso
30fef1aa1134c5f3778c77c4417f7238 linuxmint-17.3-cinnamon-nocodecs-32bit.iso
3406350a87c201cdca0927b1bc7c2ccd linuxmint-17.3-cinnamon-nocodecs-64bit.iso
df38af96e99726bb0a1ef3e5cd47563d linuxmint-17.3-cinnamon-oem-64bit.iso

If you still have the burnt DVD or USB stick, boot a computer or a virtual machine offline (turn off your router if in doubt) with it and let it load the live session.

Once in the live session, if there is a file in /var/lib/, then this is an infected ISO.

What to do if you are affected?

Delete the ISO. If you burnt it to DVD, trash the disc. If you burnt it to USB, format the stick.

If you installed this ISO on a computer:

Put the computer offline.
Backup your personal data, if any.
Reinstall the OS or format the partition.
Change your passwords for sensitive websites (for your email in particular).

Is everything back to normal now?

Not yet. We took the server down while we’re fixing the issue.

Who did that?

The hacked ISOs are hosted on and the backdoor connects to

Both lead to Sofia, Bulgaria, and the name of 3 people over there. We don’t know their roles in this, but if we ask for an investigation, this is where it will start.

What we don’t know is the motivation behind this attack. If more efforts are made to attack our project and if the goal is to hurt us, we’ll get in touch with authorities and security firms to confront the people behind this.

If you’ve been affected by this, please do let us know.

For at finde ud om du er ramt af en bagdørsinficieret Linux Mint , så kør den her kommando:

Kode: Vælg alt

ls -l /var/lib/

Hvis terminalen skriver:
  • ls: kan ikke tilgå /var/lib/ Ingen sådan fil eller filkatalog

    ... så er din Linux Mint ikke inficeret med en bagdør.
  • Hvis den i stedet viser at der er en fil, så er din Linux Mint inficeret med en bagdør. Sluk straks for din router, hvis din Linux Mint er inficeret!

Jeg er Software ingeniør (Diplomingeniør) i Informationsteknologi og indlejede systemer, hvor indlejrede systemer er computer (microcontroller) + elektronik i for eksempel et TV, en router, en vaskemaskine og den slags