Hackers Injected Malicious Firefox Packages in Arch Linux Repo

A Supply Chain Attack Targets Arch Linux Users via the Arch User Repository (AUR)

Cybersecurity researchers have uncovered a sophisticated supply chain attack that successfully introduced malicious packages disguised as Firefox browser variants into the Arch Linux ecosystem. This attack, which occurred on July 16, 2025, involved a threat actor uploading three compromised packages to the Arch User Repository (AUR), which were designed to install a Remote Access Trojan (RAT) on unsuspecting users’ systems.

The malicious packages—librewolf-fix-bin, firefox-patch-bin, and zen-browser-patched-bin—were made available for approximately 46 hours before being detected and swiftly removed by the vigilant Arch Linux security team. Each package contained scripts that stealthily executed a silent RAT during installation, potentially granting attackers full system access without the user’s knowledge. The sophisticated evasion techniques employed suggest the involvement of experienced cybercriminals.

The incident underscores the inherent risks associated with community-maintained package repositories. While these repositories are invaluable to the open-source community, they can be vulnerable to supply chain compromises. This event serves as a critical reminder of the importance of security oversight and community vigilance.

Gnoppix Users Are Not Affected

This vulnerability does not impact Gnoppix users, as we rely exclusively on a curated selection of thoroughly vetted and audited software to ensure the integrity and security of our systems. Our commitment to stringent security protocols and software auditing protects our user base from such third-party supply chain attacks.

Urgent Call to Action for Arch Linux Users

The Arch Linux security team has issued an urgent advisory. Users who installed any of the compromised packages are strongly advised to take immediate action:

  • Remove the affected software packages.

  • Conduct a comprehensive security audit of your system.

  • Change all system passwords.

  • Review system logs for any suspicious activity.

  • Consider rebuilding your installation from a clean source if necessary.

In case you are using ARCH Linux, it is critical that you test your system immediately to ensure you have not been affected.