

The malware used is also successfully detected by all relevant antivirus programs.ĭuring the hack to the Pale Moon server, the author of the browser details that: The user could detect changes in the installer by checking the SHA256 attached to the hashes or digital signature files.
#Pale moon browser 26 software#
The server from which the current editions of Pale Moon were distributed did not suffer, the problem affects only old versions of Windows installed from the server already described (old versions are moved to this server when new versions are available).Īfter gaining access, the attackers selectively infected all the exe files related to Pale Moon which are the installers and self-extracting files with Win32 / ClipBanker.DY Trojan software intended to steal cryptocurrencies by replacing bitcoin addresses in the swap buffer.Įxecutable files within zip files are not affected. The server is currently disabled for investigation. According to preliminary data, the malware replacement was performed on Decemand was detected only on July 9, 2019, that is, a year and a half went unnoticed. In this access the attackers infected with malware all executable files on the server with Pale Moon installers for Windows.

#Pale moon browser 26 archive#
The author of the browser, Pale Moon, revealed information about unauthorized access to one of the servers from the web browser “”, which kept the archive of previous versions of the browser up to and including version 27.6.2.
