Xubuntu.org Might Be Compromised

Nature of the Xubuntu.org compromise

  • Reports indicate the ISO images themselves from official Ubuntu mirrors match Canonical’s SHA256SUMS and appear clean.
  • The compromise seems specific to the torrent download path: the “torrent” links served a ZIP containing a Windows .exe plus a TOS file (with a “Copyright 2026” string that raised suspicion).
  • The malicious ZIP did not contain a .torrent file, so users had to run the .exe to proceed, which is where the malware came from.

Malware behavior and impact

  • The .exe shows a GUI to “choose Xubuntu version” and then outputs a link, but in the background:
    • Drops a second-stage executable into %APPDATA%\osn10963\elzvcf.exe.
    • Registers it under HKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence.
    • Monitors the clipboard for cryptocurrency addresses (BTC, LTC, ETH, DOGE, Tron, Ripple, Cardano) and replaces them with attacker-controlled addresses.
    • Includes some anti-debugging / anti-VM checks.
  • It targets Windows users fetching Xubuntu; if you only used a clean ISO to wipe Windows, the malware would be irrelevant, but users who ran the installer on Windows or just tried a live ISO after infection could be affected.

Reactions to the “slip-up” explanation

  • An official community statement calling it “a bit of a slip-up” drew heavy criticism as minimizing a serious incident.
  • Some argue the distro is now untrustworthy and should be forked; others counter it was “just” a web compromise, not a code-repo backdoor, and note Xubuntu is largely volunteer-driven.
  • There’s debate over Canonical’s responsibility since Xubuntu is an official flavor and reputation risk spills over to Ubuntu.

Checksums, signatures, and trust

  • Several comments stress that checksums alone are insufficient if the same compromised site serves both ISO and checksum.
  • Recommended practices discussed:
    • Verifying PGP signatures on checksum files with keys obtained via independent channels (e.g., distro packages, keyservers).
    • Using VirusTotal rather than relying on a single AV.
  • Some question the utility of checksums in the HTTPS era; others point out they remain important for untrusted mirrors and accidental corruption.

Broader security and ecosystem concerns

  • Discussion extends to:
    • Qubes OS and limiting blast radius with disposable VMs (though Qubes images themselves must still be verified).
    • Supply-chain and state-actor threats (including references to the xz backdoor), with disagreement over how much individuals should worry.
    • Lack of sandboxing for dependencies (e.g., seemingly harmless Python modules having full system access).
  • Separate but related examples: a long-lived fake Lubuntu domain still serving old images, and SEO-optimized fake download sites for other tools, with some browser extensions (e.g., uBlock Origin lists) blocking known bad domains.

User behavior, wallets, and threat model

  • The specific malware only pays off if users store or transact crypto on everyday machines.
  • Some participants argue that convenience means many do exactly that, including on mobile; others keep wallets on dedicated or offline devices.