Oct 08, 2016, 11:24 am
(This post was last modified: Oct 08, 2016, 11:26 am by Carjacker. Edited 1 time in total.)
Transmission 2.92 for OS X has been infected with malware. The following information is taken directly from https://transmissionbt.com/keydnap_qa/
We recommend that every OS X user who installed Transmission recently follow the described steps to check for infection.
Transmission wrote:
Q. What happened?
A. It appears that on or about August 28, 2016, unauthorized access was gained to our website server. The official Mac version of Transmission 2.92 was replaced with an unauthorized version that contained the OSX/Keydnap malware. The infected file was available for download somewhere between a few hours and less than a day. Additional information about the malware is available here and here.
Q. What steps have been taken following the incident?
A. The infected file was removed from the server immediately upon discovering its existence, which was less than 24 hours after the file was posted to the website. To help prevent future incidents, we have migrated the website and all binary files from our current servers to GitHub. Other services, which are currently unavailable, will be migrated to new servers in the coming days. As an added precaution, we will be hosting the binaries and the website (including checksums) in two separate repositories.
Q. Am I at risk?
A. The infected file was available for download from our website for less than a day, and the file was not available through the auto-update mechanism. Steps to check for, and remove, an infection are available here.
Q. Can you share any more information about this incident?
A. We are in the process of investigating the incident and will share any relevant information that we discover here.
Source: http://linuxtracker.org/
We recommend that every OS X user who installed Transmission recently follow the described steps to check for infection.
Transmission wrote:
Q. What happened?
A. It appears that on or about August 28, 2016, unauthorized access was gained to our website server. The official Mac version of Transmission 2.92 was replaced with an unauthorized version that contained the OSX/Keydnap malware. The infected file was available for download somewhere between a few hours and less than a day. Additional information about the malware is available here and here.
Q. What steps have been taken following the incident?
A. The infected file was removed from the server immediately upon discovering its existence, which was less than 24 hours after the file was posted to the website. To help prevent future incidents, we have migrated the website and all binary files from our current servers to GitHub. Other services, which are currently unavailable, will be migrated to new servers in the coming days. As an added precaution, we will be hosting the binaries and the website (including checksums) in two separate repositories.
Q. Am I at risk?
A. The infected file was available for download from our website for less than a day, and the file was not available through the auto-update mechanism. Steps to check for, and remove, an infection are available here.
Q. Can you share any more information about this incident?
A. We are in the process of investigating the incident and will share any relevant information that we discover here.
Source: http://linuxtracker.org/