chore(tags): update fractureiser

Signed-off-by: seth <getchoo@tuta.io>
This commit is contained in:
seth 2023-06-08 18:45:13 +00:00
parent 0706fc2641
commit 72d7ce39fe
No known key found for this signature in database
GPG key ID: D31BD0D494BBEE86

View file

@ -4,6 +4,8 @@ color: orange
aliases: ['malware']
---
Starting June 6th, 2023 UTC, there have been reports of malware being distributed through websites such as Curseforge, Bukkit, and possibly others in the form of mods, plugins, and modpacks. **We recommend against downloading/updating mods or launching Minecraft at all for now**.
Starting June 6th, 2023 UTC, there have been reports of malware being distributed through websites such as Curseforge, Bukkit, and possibly others in the form of mods, plugins, and modpacks. According to both [Modrinth](https://twitter.com/modrinth/status/1666853947804463115) and [Curseforge](https://twitter.com/CurseForge/status/1666741580022128641), all infected files have been removed. These services should be safe to use now, however users should still take caution in downloading files, especially from less trustworthy services.
This is a rapidly changing situation, and for the most up to date information you should go to [this](https://hackmd.io/@jaskarth4/B1gaTOaU2) document. We have also provided resources to help users find out what to do next [here](https://prismlauncher.org/news/cf-compromised-alert/#what-can-i-do). This includes scripts for both Windows and Linux (the operating systems known to be affected so far) to help you find out if your system has been infected. In the case files are found, they should be deleted - however, we still recomend to **change all of your passwords**, especially for accounts with login information saved in your browser.
This is a complex situation, and for a full explanation you should go to [this](https://github.com/fractureiser-investigation/fractureiser) GitHub repository. We have also provided resources to help users find out if they have been affected [here](https://prismlauncher.org/news/cf-compromised-alert/#what-can-i-do). This includes scripts for both Windows and Linux (the operating systems known to be affected so far) to help you find files used by Fractureiser.
In the case files are found, they should be deleted - however, we still recommend to **change all of your passwords**, especially for accounts with login information saved in your browser. There are also tools such as [NekoDetector](https://github.com/MCRcortex/nekodetector) that allow you to check for any Java files that could place these files on your computer again, and a [web app](https://douira.github.io/fractureiser-web-detector/) that allows you to scan individual mods.