The Monero Project is currently investigating a potential compromise of the official website after a coin stealer was found in the Linux 64-bit command line (CLI) Monero binaries downloaded from the download page.
“CLI binaries available on http://getmonero.org may have been compromised at some point during the last 24h. Investigations ongoing,” the Monero team said on Twitter.
As reported and confirmed by multiple users on GitHub, Reddit and Twitter, the Monero website delivered potentially malicious binaries with not matching hashes a little over 30 minutes. At the moment all binaries are clean as they are currently delivered from a secure fallback hosting server.
#Monero Security Warning:
CLI binaries available on https://t.co/UYopePqqdo may have been compromised at some point during the last 24h. Investigations ongoing.https://t.co/BqnONy4PPg
— Monero || #xmr (@monero) November 19, 2019
Users are encouraged by moderators on the Monero subreddit to “check the integrity of the binaries and verify that they were signed by Fluffypony’s GPG key.”
Guides on how to check if the downloaded binaries have the corrected hashes are available for Windows here and for Linux and macOS here.
Although Windows and macOS files haven’t been reported to be compromised, users of all platforms should check the hashes for all downloaded Monero binaries since all of them could’ve been switched with malicious versions.
Correct hashes for all Monero binaries available for download on the official site are here: https://web.getmonero.org/downloads/hashes.txt.
Malicious binaries drop a coin stealer
While a full analysis of the malicious Monero binaries that were distributed through the project’s official download platform is not yet available, security researcher and contributor to the Monero project SerHack says that he was able to find a coin stealer embedded within.
“I can confirm that the malicious binary is stealing coins. Roughly 9 hours after I ran the binary a single transaction drained the wallet,” moneromanz, one of the users who downloaded the compromised Monero binaries, confirmed. “I downloaded the build yesterday around 6pm Pacific time.”
“I have not completed any malware analysis as of yet, but I’d like to get to the bottom of whether the binary is limited to stealing xmr, or also tries to compromise the machine as a whole or any of its files,” he adds.
The malicious binaries downloaded from the official Monero website during the approximately 30 minutes window were also uploaded by moneromanz to an anonymous file hosting server and are available for analysis at https://anonfile[.]com/bbq8h9Bdn7/monero-wallet-cli.
>> Source Link