Trojan Chaos RAT Discovered in Arch User Repository

📟 News

Date: 22/07/2025

Developers of Arch Linux discovered three malicious packages in the Arch User Repository (AUR). These packages were used to install the Chaos remote access trojan (RAT) on Linux devices.

The packages were named librewolf-fix-bin, firefox-patch-bin, and zen-browser-patched-bin, and were uploaded by the user danikpapas on July 16, 2025. The packages were removed from the repository two days later, after the community flagged them as malicious.

“On July 16, a malicious package was uploaded to AUR,” warn the AUR maintainers. “Two more malicious packages were uploaded by the same user a few hours later. These packages executed a script from a repository on GitHub, which was identified as a remote access Trojan (RAT).”

As with many other package repositories, there is no formal procedure for reviewing new or updated packages in the AUR. This means that users should independently review the code and installation scripts before building and installing a package.

Although the packages have now been removed, Bleeping Computer examined their archived copies. The PKGBUILD file of all the packages contained a source entry with the name patches, which pointed to a GitHub repository controlled by the attacker: https://github.com/danikpapas/zenbrowser-patch[.]git.

During the processing of PKGBUILD, this repository is cloned and considered as part of the package update and build process. However, instead of a patch, the repository on GitHub contained malicious code that was executed during the build or installation phase. Currently, this repository has been removed from GitHub, and the .git is no longer available for analysis.

The publication also notes that the malware was attempted to be promoted on Reddit through responses to various topics related to Arch Linux (where malicious packages in AUR were promoted in the messages). Comments were posted from an account that had been inactive for many years and was likely compromised and used for “advertising” the malware.

Arch users on Reddit immediately found the comments suspicious, uploaded one of the components to VirusTotal, and discovered Chaos RAT in it.

Chaos RAT is an open-source remote access trojan for Windows and Linux. It can be used for uploading and downloading files, executing commands, and opening a reverse shell. As a result, attackers gain full access to the infected device.

This Trojan is often used in campaigns to distribute cryptocurrency miners, as well as for collecting credentials, stealing information, or espionage.

In this case, after installation, the malware repeatedly connected to the command server 130.162[.]225[.]47:8080, waiting for commands.

“We strongly recommend that users who may have installed any of these packages remove them from their system and take necessary measures to ensure they have not been compromised,” warns the Arch Linux team.

In particular, it is recommended to immediately check for the presence of a suspicious executable file named systemd-initd, which may be located in the /tmp directory. If the file is found, it should be deleted.

Related posts:
2025.04.08 — Website of Everest ransomware group hacked and defaced

Last weekend, the darknet website of the Everest ransomware group was hacked and went offline. The attackers replaced its content with a sarcastic message: "Don't do crime…

Full article →
2025.03.05 — Polish Space Agency disconnects its network due to hacker attack

Last weekend, the Polish Space Agency (POLSA) had to disconnect all of its systems from the Internet to localize an attack targeting its IT infrastructure. After discovering the intrusion,…

Full article →
2025.02.03 — PyPI introduces a project archival system to combat malicious updates

The Python Package Index (PyPI) introduces a new project archival system: a project can now be archived to notify users that it's not expected to be updated…

Full article →
2025.02.09 — Abandoned AWS S3 buckets could be used in attacks targeting supply chains

watchTowr discovered plenty of abandoned Amazon S3 buckets that could be used by attackers to deliver malware and backdoors to government agencies and large corporations. The researchers discovered…

Full article →
2025.01.30 — Hackers use vulnerabilities in SimpleHelp RMM to attack corporate networks

Experts believe that recently patched vulnerabilities in SimpleHelp Remote Monitoring and Management (RMM) were used by attackers to gain initial access to corporate networks. A number…

Full article →
2025.04.04 — Privilege escalation vulnerability in Google Cloud resulting in sensitive data leaks finally patched

Tenable Research revealed details of a recently patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run enabling an attacker to gain access to container images…

Full article →
2025.04.30 — Coinbase fixes 2FA bug that made customers panic

Cryptocurrency exchange Coinbase has fixed a bug in its Account Activity logs that caused customers to think their credentials were compromised. Earlier this month, BleepingComputer…

Full article →
2025.01.28 — J-magic backdoor attacked Juniper Networks devices using 'magic packets'

A massive backdoor attack targeting Juniper routers often used as VPN gateways has been uncovered. The devices were attacked by the J-magic malware that…

Full article →
2025.04.16 — Android devices will restart every three days to protect user data

Google introduces a new security feature for Android devices: locked and unused devices will be automatically restarted after three days of inactivity to return their memory to an…

Full article →
2025.03.28 — Zero-day vulnerability in Windows results in NTLM hash leaks

Security experts reported a new zero-day vulnerability in Windows that enables remote attackers to steal NTLM credentials by tricking victims into viewing malicious files in Windows…

Full article →