From the Emudeck discord:

@everyone Hey everyone, apologies for the ping but since this is deemed as critical to the security of people’s devices here, I will have to. Cemu (The Wii U emulator) was recently compromised by a malicious attacker using a known developers account, this compromise took place from May 6th to May 12th, and introduces malware that is known to steal passwords, SSH keys, GitHub tokens, and likely more they are not fully aware of at this moment. We recommend anybody who is on Linux or SteamOS to go into the EmuDeck app, Manage Emulators tab, Cemu, and click Reinstall/Update, and make sure the hash of the AppImage (Located in Home/Applications, right click Cemu AppImage, go into Properties, Checksums, and Calculate the SHA256 hash) matches the non-compromised version provided by the Cemu developers, if you have used Cemu from the dates I have mentioned, and the SHA256 hash does not match what is listed, assume your system may be compromised if it was ran. If you are on Windows, MacOS, or used the Flatpak version, you are not affected by this malware. More information regarding this attack can be found here. https://rentry.org/cemu-security-psa

The specifically affected packages were:

Cemu-2.6-x86_64.AppImage

cemu-2.6-ubuntu-22.04-x64.zip

  • Fubarberry@sopuli.xyzOPM
    link
    fedilink
    English
    arrow-up
    62
    ·
    15 hours ago

    Also I thought this part was interesting:

    Special note for Israeli users: If the malware determines that your location is Israel (it does this via locale and timezone checks) then it has a 1:6 chance that it will play a loud siren sound and run rm -rf /, essentially attempting to wipe your filesystem.

  • TachyonTele@piefed.social
    link
    fedilink
    English
    arrow-up
    28
    ·
    15 hours ago

    If you are on Windows, MacOS, or used the Flatpak version, you are not affected by this malware.
    Flatpacker here. Thank you for including this

  • gedfromgont@piefed.ca
    link
    fedilink
    English
    arrow-up
    9
    ·
    12 hours ago

    The following files and directories may be created by the malware: /tmp/.transformers /usr/bin/pgmonitor.py ~/.local/bin/pgmonitor.py /etc/systemd/system/pgsql-monitor.service ~/.config/systemd/user/pgsql-monitor.service /tmp/kubectl The absence of these files does not prove that you are safe.

    Wouldn’t the Steamdecks immutability prevent changes to the filesystem in these folders? After rebooting at least.

    • pivot_root@lemmy.world
      link
      fedilink
      arrow-up
      10
      ·
      11 hours ago

      /tmp/kubectl

      If someone has kubectl installed on their steam deck, they have more problems than just malware. For example: workaholism.

    • afaix@lemmy.world
      link
      fedilink
      arrow-up
      13
      ·
      12 hours ago

      Some of the directories are in the home (the tilda ~ means home of the current user) and home directory is not immutable