Bitcoin Forum
October 23, 2025, 11:32:44 AM *
News: Latest Bitcoin Core release: 30.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Xubuntu website hacked, distributing crypto malware.  (Read 58 times)
Forsyth Jones (OP)
Legendary
*
Offline Offline

Activity: 1694
Merit: 1696


I love Bitcoin!


View Profile WWW
October 20, 2025, 04:39:03 PM
Merited by pooya87 (5), ABCbits (1)
 #1

According to some sources, Xubuntu v23.10 experienced a security incident where users reported that the official website distributed an installation file containing malware, such as malware that swaps Bitcoin addresses with the attacker's address.

With users coming primarily from Windows, especially Windows 10, where they will be unsupported and with the absurd requirements of Windows 11, Xubuntu is a lightweight alternative, especially for machines with weak hardware.

This reinforces the importance of checking the hashes of downloaded files, verifying pgp signatures and keeping the OS always updated. As you can see, even official sources can be compromised.

One of the sources: https://www.neowin.net/news/xubuntu-website-compromised-to-deliver-crypto-malware-to-windows-10-refugees/

Cryptohygenic
Full Member
***
Offline Offline

Activity: 504
Merit: 100


I am full of Divine and Fortunes!


View Profile
October 20, 2025, 05:57:16 PM
 #2

According to some sources, Xubuntu v23.10 experienced a security incident where users reported that the official website distributed an installation file containing malware, such as malware that swaps Bitcoin addresses with the attacker's address.

With users coming primarily from Windows, especially Windows 10, where they will be unsupported and with the absurd requirements of Windows 11, Xubuntu is a lightweight alternative, especially for machines with weak hardware.

This reinforces the importance of checking the hashes of downloaded files, verifying pgp signatures and keeping the OS always updated. As you can see, even official sources can be compromised.

One of the sources: https://www.neowin.net/news/xubuntu-website-compromised-to-deliver-crypto-malware-to-windows-10-refugees/


I have only been reading about how vulnerable users can be against scams. With most current news I have been reading in this issues of crypto threat has been about our device being vulnerables to some malwares that targets users (Us) directly from the device factory with one or two of the interconnected components and the Operating System being weak and not reliable to resist specific malware attacks.

We have now shifted from the threats that directly attack users.
So all devices or brands should be tamed vulnerable since they are all made through global support chain parts. So their securities chains does not have to be trusted. But it helps a lot when you buy your device from reputable brands and supplies. We also can not stay total free from this threats. We just have to keep our best to avoid them as we can.

ABCbits
Legendary
*
Offline Offline

Activity: 3402
Merit: 9266



View Profile
October 21, 2025, 08:31:23 AM
 #3

According to some sources, Xubuntu v23.10 experienced a security incident where users reported that the official website distributed an installation file containing malware, such as malware that swaps Bitcoin addresses with the attacker's address.
--snip--
One of the sources: https://www.neowin.net/news/xubuntu-website-compromised-to-deliver-crypto-malware-to-windows-10-refugees/

Source you mentioned doesn't mention the version number. But i find it's weird the hacker chose version 23.10 rather than long term support (24.04) or latest version (25.10) which is more likely to be downloaded.

retaur
Newbie
*
Offline Offline

Activity: 28
Merit: 11


View Profile
October 21, 2025, 12:53:15 PM
 #4


Source you mentioned doesn't mention the version number. But i find it's weird the hacker chose version 23.10 rather than long term support (24.04) or latest version (25.10) which is more likely to be downloaded.

If it's an inside job, maybe it's what they had control of. If not, maybe it's what they could find to try to attack.

I think the most recent version of an OS and the LTS version are going to have the most current active mirrors running (specifically for that and ignoring archives). I think it's likely they could've been using that to bypass validation or perhaps they were already caught by something else and had their access revoked. I wonder if the source was impacted, I imagine not but I thought a lot of releases would come from directly building code from git so you get a hash from the repo for additional validation too.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!