Skip to content

Latest commit

 

History

History
162 lines (95 loc) · 6.34 KB

timeline.md

File metadata and controls

162 lines (95 loc) · 6.34 KB

Timeline

The timeline is from bottom-to-top. Topmost events are the most recent.


2023-06-07 18:51 UTC

The second C&C server 107[.]189.3.101 has been suspended by its hosting provider


2023-06-07 16:00 UTC

Due to lag in the HackMD, this document was transferred to the GitHub repository https://github.com/fractureiser-investigation/fractureiser


2023-06-07 14:40 UTC

The unobfuscated stage 3 was replaced by an obfuscated one, then further by another payload.

That payload is the skyrage updater, which is a known Minecraft malware targeting spigot servers.

(TODO this timeframe is not completely accurate)


2023-06-07 14:20 UTC

Analysis of the new IP address yields a fully deobfuscated stage 3, seemingly uploaded by accident. It has been archived here: https://github.com/clrxbl/NekoClient


2023-06-07 14:19 UTC

The Cloudflare pages domain has been taken down.


2023-06-07 14:05 UTC

The Cloudflare pages domain has switched to pointing to a new IP address, 107.189.3.101.


2023-06-07 08:52 UTC

The dust has mostly settled for now. We have a good idea of the early stages of the malware, and stage 3 is being reverse-engineered. The first stage is temporarily dormant.

We will resume updates next morning US time (or thereabouts).


2023-06-07 08:09 UTC

We are still working on reversing stage 3, see the section below for technical details.


2023-06-07 07:37 UTC

CurseForge published the following statement in their discord's #news channel:

Hey everyone,

We would like to address the current situation that is ongoing and highlight some important points:

  • A malicious user has created several accounts and uploaded projects containing malware to the platform
  • Separately a user belonging to Luna Pixel Studios (LPS) was hacked and was used to upload similar malware
  • We have banned all accounts relevant to this and disabled the LPS one as well. We are in direct contact with the LPS team to help them restore their access
  • We are in the process of going through ALL new projects and files to guarantee your safety. We are of course holding the approval process of all new files until this is resolved
  • Deleting your CF client isn’t a recommended solution as it will not solve the issue and will prevent us from deploying a fix. We are working on a tool to help you make sure you weren’t exposed to any of this. In the meantime refer to information published in #current-issues.
  • This is relevant ONLY to Minecraft users
  • To be clear CurseForge is not compromised! No admin account was hacked.

We are working on this to make sure the platform remains a safe place to download and share mods. Thank you to all authors and users who help us with highlighting, we appreciate your cooperation and patience ❤️

Stay tuned for more updates and we will clear this issue.


2023-06-07 07:24 UTC

Darkhax has contacted Curseforge representatives who have confirmed that the affected files were uploaded via the UI, not the API.

Curseforge has halted upload approvals while this situation unfolds and have taken down many infected files.

They are also investigating the IPs of the uploaders of the malicious files, to see if they match previous requests by the rightful account holders.


2023-06-07 7:03 UTC

We believe we've discovered the true function of Stage3 (client.jar) and are attempting to document it here. It's not good, folks.

The quick version, while we get this document in shape: client.jar searches the entire filesystem for files that look like mod JARs, and infects them with Stage0. This includes entire Gradle and Maven caches, as well as tons of things mod devs would likely never think to check. The potential scale and scope of this infection has gone from "a couple weird mods" to potentially infinite.

We believe this is how the infection initially spread, and Curseforge may not have been the initial attack vector.


2023-06-07 6:27 UTC

Investigation has slowed down and most of the team is going to bed. xylemlandmark has opened an email inbox for people to submit samples or other useful information. williewillus is currently working to clean up and get the information presented by Shadowex3 into this doc.


2023-06-07 6:20 UTC

Shadowex3 informs the unofficial Discord that they have a copy of the full (untruncated) Stage 3 client.jar, as well as an in-depth analysis of what the malware is doing. They first noticed this weeks ago and undertook in-depth analysis, and as a result was able to obtain full copies of all the payloads.


2023-06-07 5:27 UTC

We've discovered a potential (truncated) Stage 3 file; it is heavily obfuscated and contains a native payload DLL that attempts to steal credentials from the Windows credentials store.


2023-06-07 4:57 UTC

Files uploaded in April have been discovered; either the dates are being spoofed, or this has been going on even longer. Many of the accounts have Last Active times in 1999 — likely a quirk with old CurseForge accounts, but still notable.

Modrinth staff are investigating if any uploads on there are compromised. A quick pass they did through recently updated projects looked OK.


2023-06-07 4:40 UTC

The scope of this compromise seems larger than initially realized. The malicious files go back multiple weeks, as early as May 20th. We only noticed today because they compromised a popular modpack.


2023-06-07 3:38 UTC

The C&C server has been taken down by the server provider. A new one will likely come up if the Cloudflare page stays up, we're monitoring it.


2023-06-07 3:26 UTC

We were sent a possible Stage 2 jar by an anonymous user that claims to work at a server host.


2023-06-07 2:26 UTC

The #cfmalware EsperNet channel is created to coordinate discussion that had been happening in multiple Discord guilds and Matrix spaces.


2023-06-07 0:40 UTC

The team behind this document learns of the malicious files included in an unauthorized update to Better Minecraft.


2023-06-03 (approximately? TODO is this correct) Shadowex3 notices the activity and reverse engineers a large chunk of it.

They wanted to coordinate to gather more intel before tipping the attackers off that something was happening. As a result, they captured a reasonably complete set of files containing all stages of the malware, besides a missing lib.dll file.