The Free Software Foundation, sponsors of the GNU free software project, said Wednesday that a key server housing the group’s Linux software was broken into by a malicious hacker.The software, which the Free Software Foundation refers to as GNU/Linux is a variant of Linux that is available free on the Internet.The intrusion, which took place in March, compromised an FTP server that housed software making up the core of the FSF’s GNU/Linux operating system, according to Bradley Kuhn, executive director of the Free Software Foundation (FSF) in Boston.Those files included the GNU C language library and compiler, as well as other software utilities, Kuhn said. The intruder compromised the FSF server using a now-patched vulnerability in a Linux component called PTRACE.That vulnerability, which could enable attackers to remotely compromise and take control of affected Linux systems, was disclosed in March. No patch for the vulnerability was available when the FSF server was compromised, Kuhn said. After gaining control of the FSF server, the malicious hacker took steps to disguise the compromise, installed a trojan horse program giving him or her access to the machine and harvested passwords from user accounts on the server, Kuhn said.The affected accounts belonged to so-called “maintainers,” FSF volunteers who are charged with maintaining various components of the GNU software, he said.Those people have been notified about the compromise, he said.After learning of the compromise in late July, FSF staff took the server off-line and replaced it with a secure server. The organization also removed all GNU software from the compromised system.Since it discovered the problem, the FSF has been methodically reviewing the integrity of thousands of files exposed by the break-in and returning them to their FTP server, Kuhn said.FSF volunteers have checked the versions of the software from the compromised server with originals in possession of the maintainers as well as copies from backups done before the compromise, he said. As of Thursday, 80% or 90% of the original files have verified and reposted to the server. The FSF feels confident that the malicious hacker was interested in obtaining passwords, not tampering with the GNU software, Kuhn said.“We have no evidence that anybody did anything,” he said.All the same, the FSF encourages GNU users who downloaded software from the site between March and July, as well as Internet sites that mirror the source code from the compromised server to verify the integrity of their GNU software.In addition to comparing file size and time stamps, users can refer to a list of valid file signatures, known as MD5 hashes, that validate the content of the GNU files, according to the CERT Coordination Center, which issued an advisory about the break-in on Wednesday. The FSF posted a secure list of MD5 hashes on its server.According to Kuhn, the FSF fell victim to a new Linux vulnerability and changes in the culture of the Internet.“We’ve always tried to design the system so it’s convenient,” he said.“Unfortunately, the world of the Internet that created the Free Software Foundation in 1985 isn’t the world of the Internet in 2003.”The FSF will be tightening up access to its host servers for volunteers looking to post updates to FSF servers, he said.The organization will also be requiring its hundreds of volunteer maintainers to post MD5 signatures with each software update. In the past, the FSF had no hard policy on the use of signatures with updates, he saidWhile it doesn’t undermine the integrity of GNU’s software, the incident is a black eye for the FSF, according to Richard Smith, a Boston-based independent security consultant.“It’s bad PR, that’s for sure,” Smith said.The FSF should institute a better system for signing and tracking software updates in the future, Smith said.“There needs to be some accountability,” he said. Related content news analysis Western Digital keeps HDDs relevant with major capacity boost Western Digital and rival Seagate are finding new ways to pack data onto disk platters, keeping them relevant in the age of solid-state drives (SSD). By Andy Patrizio Dec 06, 2023 4 mins Enterprise Storage Data Center news analysis Global network outage report and internet health check Cisco subsidiary ThousandEyes, which tracks internet and cloud traffic, provides Network World with weekly updates on the performance of ISPs, cloud service providers, and UCaaS providers. By Ann Bednarz and Tim Greene Dec 06, 2023 286 mins Networking news analysis Cisco uncorks AI-based security assistant to streamline enterprise protection With Cisco AI Assistant for Security, enterprises can use natural language to discover policies and get rule recommendations, identify misconfigured policies, and simplify complex workflows. By Michael Cooney Dec 06, 2023 3 mins Firewalls Generative AI Network Security news Nvidia’s new chips for China to be compliant with US curbs: Jensen Huang Nvidia’s AI-focused H20 GPUs bypass US restrictions on China’s silicon access, including limits on-chip performance and density. By Anirban Ghoshal Dec 06, 2023 3 mins CPUs and Processors Technology Industry Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe