Firefox-patch-bin, librewolf-fix-bin AUR packages contain malware
Incident and Impact
- Three AUR packages —
librewolf-fix-bin,firefox-patch-bin,zen-browser-patched-bin— were found to contain a remote access trojan (RAT) that gives full control of the machine to the attacker. - Packages existed only a few days before removal; they were new, not compromises of the popular
librewolf-binorzen-browser-bin. - Several comments argue that with a RAT there is no reliable cleanup: the only safe response is to assume total compromise, take machines offline, back up data, and fully reinstall.
Information Gap and Indicators of Compromise
- Some participants criticize the advisory for not listing technical indicators (files, startup entries, etc.) that would help users check systems.
- Others counter that Arch’s priority is rapid notification; a full malware analysis is unrealistic, and a RAT may leave few or no consistent traces, especially if payloads are dumped to
/tmpand cleaned up or actions vary per host.
How the Attack Worked
- The AUR PKGBUILDs pulled code from a GitHub repo; a Python script downloaded a binary payload later uploaded to VirusTotal.
- One package declared
provides=('firefox'), so many existing packages that depend onfirefoxappeared as “dependents”, likely to increase visibility. - At least one Reddit post promoted the malicious
zen-browser-patched-binas a “great find”, suggesting deliberate social engineering.
AUR Trust Model and User Responsibility
- Repeated emphasis that AUR is explicitly “untrusted user content”: anyone can upload, packages are not vetted, and users are expected to read PKGBUILDs before building.
- Arch’s official tools (
pacman) do not interact with AUR; third‑party “helpers” (yay, paru, etc.) simply automate fetching PKGBUILDs and usually show PKGBUILD/diffs before building. - Disagreement over real‑world behavior: some claim most Arch users install from AUR “without a second thought”; others dispute this and view AUR use as inherently “at your own risk”.
Proposals for Better Safeguards
- Suggestions: tools to print all URLs in PKGBUILDs, highlight diffs on update, or summarize new commits to make manual review easier. Helpers already do some of this; printing URLs is seen as a useful extra.
- Proposals to integrate LLMs for malware review are widely rejected as impractical (high false positives, easy to game).
- VirusTotal integration into
pacman -Uis proposed; pushback focuses on privacy, limited usefulness against new malware, high API load, and conflict with Arch’s ethos of minimalism and user control.
Broader Reflections
- Several note that similar risks exist in other ecosystems (Fedora COPR, Plasma widget store, npm, etc.).
- Some express nervousness and plan audits of third‑party repos; others frame the quick detection (within ~2 days) as evidence the AUR community is actively policing new uploads.