You are not logged in.
Pages: 1
Hello,
So I heard about the malicous aur packages recently and as a precaution I ran ps aux | grep systemd-initd
Even tho I have no aur packages installed, I was suprised to see output tho looking roughly like
user 1200 0.0 0.0 7420 1135 pts/0 S+ 15:56 0:00 grep --color=auto systemd-initd
Am I correct in thinking this is the grep process and NOT the malicous entry?
I am still fairly new to this side of Linux so am not always sure what I am looking for. Still learning about interpreting command output.
Thanks!
Last edited by OneAndOnlyRoot (2025-07-21 11:37:54)
Offline
What "malicious" AUR packages? Do you have a source or reference for that information?
If you use `man ps`, it will tell you what each column in that output is. You'll notice that the last column is the full command line of process 1903, which is `grep`.
Offline
You are correct. That is the process that is running the grep command you had just requested be run.
Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday
The shortest way to ruin a country is to give power to demagogues.— Dionysius of Halicarnassus
---
How to Ask Questions the Smart Way
Offline
What "malicious" AUR packages? Do you have a source or reference for that information?
If you use `man ps`, it will tell you what each column in that output is. You'll notice that the last column is the full command line of process 1903, which is `grep`.
It seems to be true. There is a draft announcement in the works; I do not know the specifics at this point. When it is released, there will be a sticky post on the forums linking to it.
Edit: Here is an article: https://www.bleepingcomputer.com/news/s … epository/
Last edited by ewaller (2025-07-19 15:27:13)
Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday
The shortest way to ruin a country is to give power to demagogues.— Dionysius of Halicarnassus
---
How to Ask Questions the Smart Way
Offline
I read it here: https://www.bleepingcomputer.com/news/s … t-malware/
You are correct. That is the process that is running the grep command you had just requested be run.
Thanks for confirming. Generally, would there be multiple entries if said thing was found? So 1 being grep and the other being the actual thing?
Offline
enerally, would there be multiple entries if said thing was found? So 1 being grep and the other being the actual thing?
Absolutely correct.
Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday
The shortest way to ruin a country is to give power to demagogues.— Dionysius of Halicarnassus
---
How to Ask Questions the Smart Way
Offline
OneAndOnlyRoot wrote:enerally, would there be multiple entries if said thing was found? So 1 being grep and the other being the actual thing?
Absolutely correct.
Thanks again, appreciate your help!
Offline
"man pgrep" ![]()
Please always remember to mark resolved threads by editing your initial posts subject - so others will know that there's no task left, but maybe a solution to find.
Thanks.
https://www.bleepingcomputer.com/news/s … epository/
Collected data includes details such as the date and time, machine's ID, CPU information, Pacman (package manager) details, and the outputs of the "uname -a" and "systemctl list-units" commands.
Clowns could probably have just run a survey here and would have gotten more data than with those three AUR packages ![]()
Online
Found this thread searching as I was also curious if there was any discussion here about the incident.
Edit: Here is an article: https://www.bleepingcomputer.com/news/s … epository/
That article's from 2018; an article about the recent incident can be read here:
https://www.phoronix.com/news/Arch-Linux-Malicious-AURs
Edit: Probably meant to link this article:
https://www.bleepingcomputer.com/news/s … t-malware/
An announcement message on the aur-general mailing list (which I admit I only learned of from that article) can be read here:
https://lists.archlinux.org/archives/li … ZYE626IFJ/
Archived copies of the AUR pages for the malicious packages can be found here:
https://web.archive.org/web/20250718135 … atched-bin
https://web.archive.org/web/20250718142 … lf-fix-bin
https://web.archive.org/web/20250718140 … -patch-bin
Last edited by d-koc (2025-07-20 21:07:25)
Offline
Pages: 1