Get the latest tech news

Malware Infiltrates Pidgin Messenger's Official Plugin Repository


The Pidgin messaging app removed the ScreenShareOTR plugin from its third-party plugin list after it was found to be used to install keyloggers, information stealers, and malware targeting corporate networks. BleepingComputer reports: The plugin was promoted as a screen-sharing tool for secure Off-...

BleepingComputer reports: The plugin was promoted as a screen-sharing tool for secure Off-The-Record (OTR) protocol and was available for both Windows and Linux versions of Pidgin. After publishing our story, Pidgin's maintainer and lead developer, Gary Kramlich, notified us on Mastodon to say that they do not keep track of how many times a plugin is installed. To prevent similar incidents from happening in the future, Pidgin announced that, from now on, it will only accept third-party plugins that have an OSI Approved Open Source License, allowing scrutiny into their code and internal functionality.

Get the Android app

Or read this on Slashdot

Read more on:

Photo of Messenger

Messenger

Photo of malware

malware

Related news:

News photo

Malware exploits 5-year-old zero-day to infect end-of-life IP cameras

News photo

Microsoft exposes Iranian hackers using ‘Tickler’ malware against US and UAE defense targets

News photo

South Korean hackers exploited WPS Office zero-day to deploy malware