-
Notifications
You must be signed in to change notification settings - Fork 20.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Geth 1.9.23 spam? #21687
Comments
Please provide your exact logs from the geth-run, which includes detailed version info
|
INFO [10-11|17:25:24.194] Starting Geth on Ethereum mainnet... |
Hey @mohsenghajar thank you for reporting! It seems that someone set their nodes type to |
Got it. So is this safe to use? |
Yes, the current version and every recent version from geth.ethereum.org is save to use! |
Thanks for your report, @mohsenghajar . Your contribution helps making Ethereum safer. |
Thank you, @mohsenghajar for spotting this! I've sent an abuse report to the fake website hosting provider, WorldStream B.V. (worldstream.com) to abuse@WORLDSTREAM.NL and abuse@worldstream.com There's a set of websites hosted on IP 190.2.135.33 (190-2-135-33.hosted-by-worldstream.net) that distribute malware:
|
@MariusVanDerWijden do I understand correctly that fake nodes which distribute the message have IP addresses 31.184.196.106 and 31.184.197.89? |
Yes, those are the two fake nodes, but keep in mind that they could have faked their ip addresses of course. |
Indeed, even the site looks very similar to the original. In any case, when you download the so called Geth 1.9.23 version, you are warned by any bare minimum anti-virus that the file is suspicious. |
I have pushed these to the MetaMask (and EAL) blacklists, which should help mitigate the current threat by getting the browser extensions to disallow interaction with the webpages - MetaMask/eth-phishing-detect#4271 I will also assist with issuing takedowns, and if I can, looking into the binaries to see what they do |
I got another spam from ip 87.251.70.186 |
Abuse Department | WorldStream B.V. replied:
I checked the 3 malware websites and they all are down now. The fake ethereumdownloads.com now points to CloudFlare IP, but there's only 404 error. |
Should be fixed by #21698 by limiting the output that remote node names can produce. The fix obviously only applies to updated nodes. Closing this issue as there's not much more we can do at this time. Thank you very much for looking into this and contacting the relevant hosting companies. |
System information
Geth version:
latest
OS & Version: Linux Ubuntu 20.04
Steps to reproduce the behaviour
Install geth on Ubuntu 20.04 by going thru this set of instructions:
https://geth.ethereum.org/docs/install-and-build/installing-geth#install-on-ubuntu-via-ppas
Then run to start fresh sync
'geth --cache 40960'
After "Mapped network port", you should see the message:
' *** WARNING SECURITY UPDATE REQUIRED. YOUR GETH CLIENT IS VULNERABLE. YOUR ETHER & ERC20 ASSETS ARE AT RISK OF PERMANENT LOSS! *** Visit https://get-geth.com now to download and update to the latest version *** WARNING: DO NOT IGNORE THIS MESSAGE *** This software is open source under a GNU Lesser General Public License license. Upgrade to Geth 1.9.23 for Linux/OSX/Windows via https://get-geth.com immediately.'
The text was updated successfully, but these errors were encountered: