The situation seems to have relaxed a bit, the details on the malware and what it does is known (again if you're interested take a look at this GitHub repo) and we have tools available to detect if you're infected: - CurseForge Infected mods detection tool - NekoDetector Both these tools will detect for any traces of the malware on your PC or within your modded Minecraft installations (be sure to scan your entire drives, or at least your user folder and any folders where you run Minecraft from). NOTE: We posted this on our Discord when it happened, but forgot to post to our News feed, so if you already got the ping from our Discord about this issue, this is the same issue, not a new one. There is a thread in our Discord if you have any questions. More information about the exploit and affected mods and solutions can be found at. The best course of action currently if you play older modpacks on 1.7/1.12 is to simply not join any public servers unprotected and to add this mod to your instances to protect yourself from the exploit. ![]() Due to the nature of this being a remote code execution exploit, any attacker on the same server as you could've run any code on your computer, so as such there's no way to tell if you've been affected or what code was run. If you play singleplayer only you don't have anything to worry about, only if you play online on public servers. The scope at the moment seems to mostly affect mods on 1.7 and 1.12 but may also occur on other Minecraft versions, there is still work going on to find a full list of mods and affected versions. This is an RCE which allows bad actors to run code remotely on your computer when connected on the same server as them. If you made any config changes in the previous version, you will have to redo them.Unfortunately there is another exploit going around the modded Minecraft community at the moment. Same as above but first stop the server and use FTP to delete the following: Use FTP to rename the Forge server jar file (or Cauldron or MCPC+) to whatever Multicraft is expecting to find such as:Ĭongratulations, you've installed an ATL modserver Part 4 : Updating a modpack to a newer version.You will be asked if you really want to restore it.You should see your modpack zip file there, click on the 'Restore' link next to it.In the Multicraft Control Panel, go to Files>Backup>Restore.Upload that zip file to your server folder using FTP :.Select all the files and send them to a zip file, re-name that zip file to the name of the modpack.Go into the folder for your chosen modpack.Go into servers, here you will see a folder for each server you have downloaded.In AT Launcher, click the 'Open Folder' button at the bottom.Part 2 : Zip up your modpack and upload it You may have to manually download some mods manually, just follow the on-screen instructions AT Launcher will now download the files and assemble the modpack server.Choose the version of the modpack you want, you may also be prompted to choose which optional mods you want. ![]() Go to 'Packs' and find the modpack you want.It assumes that you have already cleared out your server folder: Part 1 : Download the server files on your computer Here's a rough step by step guide to installing an ATL Modpack server. It is possible to upload modpacks yourself without having to ask us.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |