A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

    • 30p87@feddit.de
      link
      fedilink
      arrow-up
      17
      ·
      2 years ago

      And via a website too. That’s like pushing a car. One of the main strengths of Linux are open repositories, maintained by reputable sources and checked by thousands of reputable people. Packages are checksummed and therefore unable to be switched by malicious parties. Even the AUR is arguably a safer and more regulated source. And it’s actually in there.

    • xkforce@lemmy.world
      link
      fedilink
      arrow-up
      9
      arrow-down
      2
      ·
      2 years ago

      The same people that would have given that poor nigerian prince their bank account details

    • gaael@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      2 years ago

      I’ve installed and used it, and still do.

      My internet connection is not that reliable, and when I download big files that are not torrents (say >1000 MB) and the download is interrupted because of internet disconnect, Firefox often has trouble getting back to it while FDM doesn’t.

      FDM also lets me set download speed limits, which means I can still browse the internet while downloading.

      It’s not my main tool for downloading stuff, but it has its uses.

  • drspod@lemmy.mlOP
    link
    fedilink
    arrow-up
    24
    ·
    2 years ago

    The article mentions how to check for infection:

    If you have installed the Linux version of the Free Download Manager between 2020 and 2022, you should check and see if the malicious version was installed.

    To do this, look for the following files dropped by the malware, and if found, delete them:

    /etc/cron.d/collect
    /var/tmp/crond
    /var/tmp/bs
    
  • insaneduck@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    2 years ago

    Finally linux is getting popular enough to make viruses. Yay?. Insert gru meme here

  • _cnt0@feddit.de
    link
    fedilink
    arrow-up
    9
    arrow-down
    4
    ·
    2 years ago

    malicious Debian package repository

    *laughs in RPM*

    This comment was presented by the fedora gang.

    • puffy@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      2 years ago

      Right, but you could do the same with RPM. Not everyone is aware of this, but installing a package executes scripts with root access over your system.

  • rurb@lemmy.ml
    link
    fedilink
    arrow-up
    5
    ·
    2 years ago

    I had to essentially read the same thing four times before there was any new information in this post. Not sure if that’s a Jerboa thing or what, but probably could have been avoided.

    • drspod@lemmy.mlOP
      link
      fedilink
      arrow-up
      6
      ·
      2 years ago

      Yeah I agree, sorry about that. I thought that the body-text field was mandatory to fill in, so I used the introductory paragraph from the article so as not to editorialize.