Navigation
Recherche
|
Malware Infiltrates Pidgin Messenger's Official Plugin Repository
samedi 31 août 2024, 00:02 , par Slashdot
The Pidgin messaging app removed the ScreenShareOTR plugin from its third-party plugin list after it was found to be used to install keyloggers, information stealers, and malware targeting corporate networks. BleepingComputer reports: The plugin was promoted as a screen-sharing tool for secure Off-The-Record (OTR) protocol and was available for both Windows and Linux versions of Pidgin. According to ESET, the malicious plugin was configured to infect unsuspecting users with DarkGate malware, a powerful malware threat actors use to breach networks since QBot's dismantling by the authorities. Those who installed it are recommended to remove it immediately and perform a full system scan with an antivirus tool, as DarkGate may be lurking on their system.
After publishing our story, Pidgin's maintainer and lead developer, Gary Kramlich, notified us on Mastodon to say that they do not keep track of how many times a plugin is installed. To prevent similar incidents from happening in the future, Pidgin announced that, from now on, it will only accept third-party plugins that have an OSI Approved Open Source License, allowing scrutiny into their code and internal functionality. Read more of this story at Slashdot.
https://it.slashdot.org/story/24/08/30/2047211/malware-infiltrates-pidgin-messengers-official-plugin...
Voir aussi |
56 sources (32 en français)
Date Actuelle
mer. 18 déc. - 16:23 CET
|