Difference between revisions of "User:KJ7RRV/QMFbrick"
Tags: mobile web edit mobile edit |
Tags: mobile web edit mobile edit |
||
Line 1: | Line 1: | ||
'''Trojan:Linux/QMFbrick''' is a family of malware targeting the [[PinePhone]]. | '''Trojan:Linux/QMFbrick''' (usually called QMFbrick; sometimes simply called "the PinePhone malware" or "the malware") is a family of malware targeting the [[PinePhone]]. | ||
Three variants are known: | Three variants are known: |
Revision as of 07:07, 8 December 2021
Trojan:Linux/QMFbrick (usually called QMFbrick; sometimes simply called "the PinePhone malware" or "the malware") is a family of malware targeting the PinePhone.
Three variants are known:
- QMFbrick.A: bundled with a Snake game in an Arch package
- QMFbrick.B: bundled with wlsunset in an Arch package
- QMFbrick.C: bundled with wlsunset in a Debian package
The trojans have been spread by anonymous download links in the Pine64 and DanctNIX chats.
The A variant was tested by Danct12 is known to soft-brick the modem and wipe /.
KJ7RRV is currently working on reverse engineering QMFbrick and attempting to write a removal tool, initially focusing on the B variant.
It seems that running "sudo systemctl disable --now shadlow.timer" before 20:00 on a Wednesday (local time) will stop the A variant from doing any damage. This is not guaranteed, however, and it may or may not work with B and C.
It is not known if the malware has any effects if it is disabled before the activation time. Out of an abundance of caution, a phone that has been infected, even if the malware has been disabled, should not be considered trustworthy.