Description

The Pidgin messaging app has recently removed the ScreenShareOTR plugin from its official third-party plugin list after it was discovered to contain malware. Initially promoted as a secure screen-sharing tool for the Off-The-Record (OTR) protocol the plugin was found to install keyloggers, information stealers, and Dark Gate malware used for gaining unauthorized access to corporate networks. The malicious plugin, available for both Windows and Linux, was listed on Pidgin’s plugin repository from July 6 to August 16, 2024. Users reported suspicious activity, leading to the plugin’s removal. Notably the ScreenShareOTR only provided binaries without source code, a red flag that went unnoticed due to insufficient review mechanisms in Pidgin’s repository. ESET’s investigation revealed that the plugin installer was signed with a valid digital certificate from INTERREX SP. Z O.O., a legitimate Polish company. The plugin while offering legitimate screen-sharing functions and also allowed the download of additional malicious payloads which includes PowerShell scripts and DarkGate malware in which were also signed by the same Interrex certificate. Similar tactics were used for other plugins hosted on the same malicious server, which has now been taken down. Affected users are advised to remove the ScreenShareOTR plugin immediately and perform a full system scan with a trusted antivirus tool.