Response from the admins
From where I’m sitting it looks like classic overconfidence. I would say keep your eyes open in the future but don’t pick up the pitchforks just yet.
Thanks. This community needed your logical input. I’ve been following this over the past few days and it seems like a blatent Reddit-type pitchfork situation. Based on the mods response and the absolute lack of proof surrounding the mods profiting from the crypto miner (honestly who the actual fuck even came up with this?), I think we need to all take a beat.
Also I don’t follow cracked games but this Emperess person seems like a fucking psychopath and the fact that literally anyone here believes a word she says is absolutely astonishing.
I am asking this community to PLEASE STOP REPOSTING THIS. Don’t let this community follow the ways of Reddit, please. We are better than that.
I agree, this entire thing looks very blown out of proportion to me. It’s not the first time and not the last time there will be malware in a brand new game torrent on 1337x.
This exact situation has happened before with a new game torrent that had malware, torrent eventually got taken down, and nobody raised a huge fuss other than not to download that torrent.
I feel like this community and the reddit one are made up of 14 year olds who figured out how to torrent 2 weeks ago and are freaking out over the prospect that downloading exe files isn’t safe…who would have thought!
I’ll translate: “I find actions of the 1337x admins disappointing. Deleting my torrents causes confusion for the user base, and these actions reflect poorly on your character, suggesting pusillanimity and insufficient discretion when selecting a sexual partner.”
There should be an Empress translator bot
You know it’s bad when the almost constantly unhinged ‘Empress’ is the one speaking sense.
You looked at that screenshot and said, “Ah yes, here’s someone speaking sense” ?
Something something broken clock
Yeah, except EMPRESS was just complaining that her own torrents got deleted, not that others were unsafe
I don’t know why, but I think calling people “pathetic cowardly whores” in this specific situation is hilarious.
What, exactly, does one have to do when moderating a torrent site to earn the title of “whore”?
If I were to wager a guess, empress is not a first language English speaker, and to her , it’s just a preferred general severe insult.
combined with her being completely unhinged lol
I haven’t had the courage to run executable code from P2P networks since the early 2000s. Even then it was probably a bad idea.
I see Empress is still subtle and classy as always.
I have seen multiple posts about the situation by now with various claims but no one seems to have actually looked into it so I have questions! Is it true that moderators defended the upload and silenced criticism, is it true that the crypto address in question can be linked to the sites admins and is it true that the same malware is all over the internet in countless releases? Not all of those are from this particular pist but if someone here knows the answers I would be happy to read them!
There is a discord group in the official 1337x subreddit, the user was just a vip user, not a staff/moderator and he deleted comments after posting a malware in order to keep the release alive. Maybe he was trusted before posting it, and 1337x staff are a few people (lately even less) so he wasn’t blocked quickly. Nothing more. I hope 1337x will make an announcement. The user who posted malware was under a blue nikname:
- Black - admin
- Green - moderator
- Blue - vip
- Yellow - uploader
- Red - trial uploader
- Grey - user
There wasn’t any member of the staff that was helping the vip user to delete comments. He was just deleting comments under its own post by himself.
There is no official 1337x subreddit or discord group. Go to the 1337x official chat room (link on the front page of 1337x.to) and ask about a discord group or sub reddit and they will tell you its fake.
I wouldn’t trust anything from a P2P site that purports to be:
- A cracked game / application for desktop and mobile platforms. Maybe it’s legit but assume it is malware.
- A serial number generator. If you absolutely must run one of these do it from a throwaway VM, or via WINE emulation to mitigate what it might do.
- An encrypted archive with a README. It’s a scam designed to make people sign up to other scams to release a non-existent password.
- A movie / audio with an extension such as .scr, .wma, .com, .exe etc. It’s malware.
Movies, audio & books are generally safe providing they use a recognized extension - mp3, mp4, pdf, mkv, aac, flac, epub etc. Stuff that runs under emulation like console games is generally safe. I say “generally” because an exploit could still be crafted to escape a popular media player or emulator and cause actual harm to your computer.
All the ads and 3rd party scripts should be considered malicious too and should be erased with an adblocker, or even better use Tor.
So basically use some common sense and if you really want some game or app, just buy the damned thing or wait for it to go on sale.
wine is a windows api implementation, it’s specifically NOT an emulator
Read their own FAQ. It’s not an emulator in the classic sense of emulating the OS. It is however emulating the API of Windows. I quoted the pertinent line of the FAQ elsewhere and made my point clearer
Not sure what the thumbs down is about. It’s right there in their own FAQ.
In fact it ends by saying - “Wine is not just an emulator” is more accurate.
There is a storied history in computing to use tongue in cheek self referential acronyms to denote some humor and finality in distinguishing things that purposely fill a niche in the world of competing, often pricey, commercial software and other hackable reasons.
So I bet you’re rubbing wrong those of us who remember that gnu is not unix, and more specifically wine is not an emulator. Because they really aren’t.
WINE is not safe to run malware in, it’s not a secure sandbox. AFAIK, anything expecting it can do anything a Linux binary can. (Also, not an emulator, it’s in the original name - WINE Is Not an Emulator)
I know what WINE is and the gist of “Wine is not an emulator”. I have used it extensively and for a while it even contained some of my code (not sure if it still does). But it is still emulating but not in the way people think. WINE is not emulating the operating system but it is emulating the interface that an executable interacts with Windows, aka the Win32 APIs and other DLLs.
They even touch on this in their FAQ - *That said, Wine can be thought of as a Windows emulator in much the same way that Windows Vista can be thought of as a Windows XP emulator: both allow you to run the same applications by translating system calls in much the same way. Setting Wine to mimic Windows XP is not much different from setting Vista to launch an application in XP compatibility mode. *
As far as a potentially malicious executable is concerned, you can create a throwaway wine folder to run the thing and delete it as soon as it is done, e.g.
e.g.
export WINEPREFIX=~/tmpwin winecfg # disable wininet from libraries tab, remove Z:, unlink all desktop integration folders wine keygen.exe # when done... rm -rf tmpwin
It doesn’t matter if keygen.exe is evil because it can write anything it likes to the fake C: and the fake registry and it’s blown away. As a precaution disable networking so it can’t reach out either. In the extremely unlikely event that keygen.exe had code to detect it was running under WINE, it would still be subject to the permissions of the uid you had run it as, so you could take even more precautions if you felt so inclined. You could even use a dockerized WINE if you felt like it.
On the topic of whether or not it’s an emulator, sounds like semantics in the end - fair enough, I disagree but you make a fair point.
That said, in terms of security I think it’s very important to point it out that it isn’t any more secure than running a random Linux executable. In my view, the original comment is advocating for running unknown executables under wine as a security measure, and the further argument is that it’s more secure because most attacks don’t target that.
Sounds like if people rely on that for security, malware will just start targeting that after people get used to assuming it’s safe.
I doubt many people are ever going to do what I suggested so the effort / payoff for malware writers makes it very unlikely they’d bother. They’ll just assume 99.999% of people running the binary are doing so on Windows and code accordingly. Of course anything is theoretically possible.