TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Transmission BitTorrent Client OSX/Keydnap Malware Incident Q+A

267 pointsby tomasandrleover 8 years ago

24 comments

okketover 8 years ago
Simple file check if you are infected:<p><pre><code> if [ -f &quot;&#x2F;Applications&#x2F;Transmission.app&#x2F;Contents&#x2F;Resources&#x2F;License.rtf&quot; ] || [ -f &quot;&#x2F;Volumes&#x2F;Transmission&#x2F;Transmission.app&#x2F;Contents&#x2F;Resources&#x2F;License.rtf&quot; ] || [ -f &quot;$HOME&#x2F;Library&#x2F;Application Support&#x2F;com.apple.iCloud.sync.daemon&#x2F;icloudsyncd&quot; ] || [ -f &quot;$HOME&#x2F;Library&#x2F;Application Support&#x2F;com.apple.iCloud.sync.daemon&#x2F;process.id&quot; ] || [ -f &quot;$HOME&#x2F;Library&#x2F;LaunchAgents&#x2F;com.apple.iCloud.sync.daemon.plist&quot; ] || [ -d &quot;&#x2F;Library&#x2F;Application Support&#x2F;com.apple.iCloud.sync.daemon&#x2F;&quot; ] || [ -f &quot;$HOME&#x2F;Library&#x2F;LaunchAgents&#x2F;com.geticloud.icloud.photo.plist&quot; ]; then echo &quot;OSX&#x2F;Keydnap detected.&quot;; else echo &quot;You&#x27;re good.&quot;; fi </code></pre> Source: <a href="https:&#x2F;&#x2F;gist.github.com&#x2F;kaizensoze&#x2F;ca96d039b295db220951d42ca7c83d89" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;kaizensoze&#x2F;ca96d039b295db220951d42ca...</a>
评论 #12404094 未加载
评论 #12403953 未加载
评论 #12405705 未加载
dantiberianover 8 years ago
They never responded with details of what they were doing to improve security after the last incident: <a href="https:&#x2F;&#x2F;forum.transmissionbt.com&#x2F;viewtopic.php?f=1&amp;t=17938" rel="nofollow">https:&#x2F;&#x2F;forum.transmissionbt.com&#x2F;viewtopic.php?f=1&amp;t=17938</a>. The outside appearance is that they didn&#x27;t address the problem seriously enough.
评论 #12404665 未加载
评论 #12404929 未加载
davejover 8 years ago
Second time that this has happened to Transmission this year. Last time a ransomware got included. If you&#x27;re a Transmission user then be <i>very</i> cautious when installing new versions.
评论 #12403848 未加载
评论 #12403869 未加载
评论 #12405619 未加载
评论 #12403864 未加载
评论 #12404076 未加载
评论 #12404489 未加载
kallebooover 8 years ago
So what happened with the codesigning? That&#x27;s pretty much the only viable line of defense for the average user (nobody is going to be verifying SHA signatures, or the site is going to be compromised along with the download)<p>Was the malware version also signed with an official Apple Developer ID? The same ID? Is a change of ID verified with the auto-updater?<p>If there was a malicious Developer ID, has it been revoked by Apple?
评论 #12404118 未加载
评论 #12403982 未加载
评论 #12404021 未加载
rahielover 8 years ago
It&#x27;s nasty that a free software project has to deal with this, given their limited resources. This shows the importance of reproducible builds and using package managers with verification like APT or homebrew.
Mahnover 8 years ago
More info on the malware:<p>&gt; The OSX&#x2F;Keydnap backdoor is equipped with a mechanism to gather and exfiltrate passwords and keys stored in OS X’s keychain. The author simply took a proof-of-concept example available on Github called Keychaindump. It reads securityd’s memory and searches for the decryption key for the user’s keychain. This process is described in a paper by K. Lee and H. Koo. One of the reasons we think the source was taken directly from Github is that the function names in the source code are the same in the Keydnap malware.<p>Source: <a href="http:&#x2F;&#x2F;www.welivesecurity.com&#x2F;2016&#x2F;07&#x2F;06&#x2F;new-osxkeydnap-malware-hungry-credentials&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.welivesecurity.com&#x2F;2016&#x2F;07&#x2F;06&#x2F;new-osxkeydnap-malw...</a>
评论 #12405341 未加载
评论 #12404612 未加载
评论 #12404006 未加载
FatalLogicover 8 years ago
I&#x27;m not a Transmission user, but this makes me wonder, as a sort of Ask HN question: How long do you wait before updating software?<p>If you always update as soon as possible, then you risk getting hit by a compromise like this one, or you could suffer other unintentional bad effects of a botched update.<p>But the longer you delay updating, the more you raise your risk of becoming a victim of a new vulnerability that&#x27;s just been patched and is now in the wild.
评论 #12404042 未加载
评论 #12403859 未加载
评论 #12403857 未加载
SturgeonsLawover 8 years ago
That&#x27;s not the first time this has happened... <a href="http:&#x2F;&#x2F;gizmodo.com&#x2F;yes-ransomware-can-affect-macs-too-1763239644" rel="nofollow">http:&#x2F;&#x2F;gizmodo.com&#x2F;yes-ransomware-can-affect-macs-too-176323...</a>
okketover 8 years ago
Service announcement: You were only at risk when you downloaded fresh copies from the website. As with the previous incident, updates within the app were safe and checked.
评论 #12404061 未加载
yladizover 8 years ago
Kinda sucks, and I haven&#x27;t followed Transmission for a while, but them transitioning more to Github is a good thing -- I trust Github more than a self hosted solution, in general. It sucks they&#x27;ve been compromised twice in a year, but hopefully this will help mitigate some of that.
Veenover 8 years ago
I like Transmission, but this is the second serious security problem they&#x27;ve had this year. Once you can forgive, but twice and it&#x27;s time to look for a new BitTorrent client.
评论 #12403907 未加载
aorthover 8 years ago
You might want to install Objective-See&#x27;s free BlockBlock tool to block these type of things:<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;objective_see&#x2F;status&#x2F;771189100355264512" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;objective_see&#x2F;status&#x2F;771189100355264512</a><p>Also, their other (free, open source) tools are very good too, like KnockKnock and RansomWhere:<p><a href="https:&#x2F;&#x2F;objective-see.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;objective-see.com&#x2F;</a>
huhtenbergover 8 years ago
&gt; Am I at risk?<p>Instead of &quot;Blah-blah, less than a day, go check yourself&quot;, they could grep the logs for IPs (and session cookies if they log that) of lucky winners and explicitly inform them, when they hit any page on their site. Then show generic version to everyone else. This takes all but 5 minutes to set up.
评论 #12404562 未加载
评论 #12404574 未加载
mirapover 8 years ago
This is happening too often... so, what other BitTorrent clients are you using on Mac OS?
deep_attentionover 8 years ago
Are there any good alternatives to Transmission on OS X?
评论 #12404238 未加载
评论 #12403832 未加载
评论 #12403822 未加载
评论 #12403895 未加载
评论 #12404527 未加载
评论 #12403830 未加载
评论 #12403932 未加载
评论 #12404471 未加载
评论 #12403821 未加载
varcharlieover 8 years ago
They say that the infected file was only there for a day, but maybe it would behoove them to do some bash-fu w&#x2F; their logs and get an approximation of the number of users affected!
fastballover 8 years ago
Wow, I downloaded a binary from the website in that exact timeframe.<p>Luckily, it was only the CLI version, which I was putting on an Ubuntu system...
thesimonover 8 years ago
Are Transmission releases usually codesigned?
评论 #12403885 未加载
cjbrambleover 8 years ago
I will be using Deluge now.
zyxleyover 8 years ago
Time to switch to qBittorrent.
menzoicover 8 years ago
According to the article, the title is wrong<p>&quot;The infected file was available for download somewhere between a few hours and less than a day.&quot;
评论 #12405458 未加载
king_philover 8 years ago
I would have thought that Mac users would be a good target in general because they might have better income than Windows users...
评论 #12404552 未加载
评论 #12403923 未加载
arianvanpover 8 years ago
Again? :(
评论 #12404531 未加载
mikegerwitzover 8 years ago
I notice that they don&#x27;t sign their releases.