Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    SSA-921111 V1.1 (Last Update: 2026-05-13): Two File Parsing Vulnerabilities in Solid Edge Before Version SE226 Update 5

    May 13, 2026

    At Least We Know the Washington Post Isn’t Buying Views

    May 13, 2026

    aria2c Improper Certificate Validation – Research Advisory

    May 13, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»JDownloader site hacked to replace installers with Python RAT malware
    News

    JDownloader site hacked to replace installers with Python RAT malware

    adminBy adminMay 9, 2026No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    JDownloader

    The website for the popular JDownloader download manager was compromised earlier this week to distribute malicious Windows and Linux installers, with the Windows payload found deploying a Python-based remote access trojan.

    The supply chain attack affects those who downloaded installers from the official website between May 6 and May 7, 2026 via the Windows “Download Alternative Installer” links or the Linux shell installer.

    According to the developers, the attackers modified the website’s download links to point to malicious third-party payloads rather than legitimate installers.

    JDownloader is a widely used free download management application that supports automated downloads from file-hosting services, video sites, and premium link generators. The software has been available for more than a decade and is used by millions worldwide across Windows, Linux, and macOS.

    The JDownloader supply chain attack

    The compromise was first reported on Reddit by a user named “PrinceOfNightSky,” who noticed that downloaded installers were being flagged by Microsoft Defender.

    “I been using Jdownloader and switched to a new PC a few weeks ago. Luckily I had the installer in a usb drive but decided to download the latest version,” posted PrinceOfNightSky to Reddit.

    “The website is official but all the Exes for windows are being reported as malicious software by windows and the developer is being listed as ‘Zipline LLC.’ And other times it’s saying ‘The Water Team’ The software is obviously by Appwork and I have to manually unblock it from windows to run it which I will not do.”

    The JDownloader developers later confirmed that the site had been compromised and took the website offline to investigate the incident.

    In an incident report, the devs said their website was compromised by attackers exploiting an unpatched vulnerability that allowed them to change website access control lists and content without authentication.

    “Changes were made through the website’s content management system, affecting published pages and links,” reads the incident report.

    “The attacker did not gain access to the underlying server stack — in particular no access to the host filesystem or broader operating-system-level control beyond CMS-managed web content.”

    The developers stated that the compromise affected only the alternative Windows installer download links and the Linux shell installer link. In-app updates, macOS downloads, Flatpak, Winget, Snap packages, and the main JDownloader JAR package were not modified.

    The developers also said that users can confirm if an installer is legitimate by right-clicking the file, selecting Properties, and then clicking the Digital Signatures tab.

    If Digital Signatures shows it was signed by “AppWork GmbH,” then it is legitimate. However, if the file is not signed or is by a different name, it should be avoided.

    Signed legitimate JDownloader installer
    Signed legitimate JDownloader installer
    Source: BleepingComputer

    The JDownloader team said that analyzing the malicious payloads was “out of our scope,” but shared an archive of the malicious installers so that others could analyze them.

    Cybersecurity researcher Thomas Klemenc analyzed the malicious Windows executables and shared indicators of compromise (IOCs) for the malware.

    According to Klemenc, the malware acts as a loader that deploys a heavily obfuscated Python-based RAT. 

    Klemenc said the Python payload acts as a modular bot and RAT framework, allowing attackers to execute Python code delivered from the command and control (C2) servers.

    The researcher also shared two command and control servers used by the malware:

    
    https://parkspringshotel[.]com/m/Lu6aeloo.php
    https://auraguest[.]lk/m/douV2quu.php

    BleepingComputer’s analysis of the modified Linux shell installer found malicious code injected into the script that downloads an archive from ‘checkinnhotels[.]com’ disguised as an SVG file.

    Malicious code in modified JDownloader Linux installer
    Malicious code in the modified JDownloader Linux installer
    Source: BleepingComputer

    Once downloaded, the script extracts two ELF binaries named ‘pkg` and `systemd-exec` and then installs ‘systemd-exec’ as a SUID-root binary in ‘/usr/bin/’.

    The installer then copied the main payload to ‘/root/.local/share/.pkg’, created a persistence script in ‘/etc/profile.d/systemd.sh’, and launched the malware while masquerading as ‘/usr/libexec/upowerd`.

    The ‘pkg’ payload is also heavily obfuscated using Pyarmor, so it is unclear what functionality it performs.

    JDownloader says users are only at risk if they downloaded and executed the affected installers while the site was compromised.

    As arbitrary code could have been executed by the malware on infected devices, those who installed the malicious installers are advised to reinstall their operating systems.

    It is also possible that credentials were compromised on devices, so it is strongly advised to reset passwords after cleaning the devices.

    Hackers have increasingly targeted the websites of popular software tools this year to distribute malware to unsuspecting users.

    In April, hackers compromised the CPUID website to change download links that served malicious executables for the popular CPU-Z and HWMonitor tools.

    Earlier this month, threat actors compromised the DAEMONTOOLS website to distribute trojanized installers containing a backdoor.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSSA-627195 V1.1 (Last Update: 2025-07-08): Zip Path Traversal Vulnerability in Mendix Studio Pro’s Module Installation Process
    Next Article SSA-626991 V1.0: Denial of Service Vulnerability in SIMATIC CN 4100 before V4.0
    admin
    • Website

    Related Posts

    News

    At Least We Know the Washington Post Isn’t Buying Views

    May 13, 2026
    News

    Windows BitLocker zero-day gives access to protected drives, PoC released

    May 13, 2026
    News

    War and Data Centers Are Driving Up the Cost of Fiber-Optic Cable

    May 13, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202674 Views

    Defending Canada’s Digital Frontier: Combating Phishing, Social Engineering, Ransomware, and Malware

    March 23, 202624 Views

    IP Address Investigations and Local OSINT

    March 20, 202624 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202674 Views

    Defending Canada’s Digital Frontier: Combating Phishing, Social Engineering, Ransomware, and Malware

    March 23, 202624 Views

    IP Address Investigations and Local OSINT

    March 20, 202624 Views
    Our Picks

    SSA-921111 V1.1 (Last Update: 2026-05-13): Two File Parsing Vulnerabilities in Solid Edge Before Version SE226 Update 5

    May 13, 2026

    At Least We Know the Washington Post Isn’t Buying Views

    May 13, 2026

    aria2c Improper Certificate Validation – Research Advisory

    May 13, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.