On Thu, Jun 28, 2018 at 8:55 PM, Duane Robertson
<du...@duanerobertson.com> wrote:
> On Thu, 28 Jun 2018 23:15:36 +0200
> "Francisco Blas Izquierdo Riera (klondike)" <klond...@gentoo.org> wrote:
>
>> Hi!
>>
>> I just want to notify that an attacker has taken control of the Gentoo
>> organization in Github and has among other things replaced the portage
>> and musl-dev trees with malicious versions of the ebuilds intended to
>> try removing all of your files.
>>
>> Whilst the malicious code shouldn't work as is and GitHub has now
>> removed the organization, please don't use any ebuild from the GitHub
>> mirror ontained before 28/06/2018, 18:00 GMT  until new warning.
>>
>> Sincerely,
>> Francisco Blas Izquierdo Riera (klondike)
>> Gentoo developer.
>>
>>
>
> Is it at all likely that any signing keys have been compromised? I
> can't think of how that would happen, but I don't know much about the
> situation.
>

It is my understanding release engineering maintains separate keys
explicitly to prevent situations like this from getting worse.

But, the same machine which was compromised (if a machine was
compromised) likely had commit signing keys. Considering the size of
Gentoo I think GitHub would respond to a request for information on
who added the malicious account to the project if that information is
not already available.


Considering what was done it could be assumed that no access to the
master repository was available. If so, any change pushed to the
mirror might have been far easier to notice and the attacker could
have considered their GitHub access worthless.

I'm not sure the above is a reasonable assessment; someone likely just
burned access easily worth multiple millions of dollars in CPU time.
Other infrastructure should be under scrutiny for past exploitation.

Cheers,
     R0b0t1

Reply via email to