This free download manager site actually just redirected Linux users to malware for years


An infostealing malware campaign has been underway for at least three years, going completely unnoticed, Russian cybersecurity firm Kaspersky has revealed.
The finding came after the company decided to take a closer look at the growing number of Linux-based attacks, which “can operate for years without being noticed by the cybersecurity community.”
This example in particular focuses on what appears to be a free download manager destined for use on Debian machines, which has been available in its malicious form since January 2020.
Debian download manager malware
Affected versions of the downloadable software contain an infected postinst script that is executed upon installation, which the analysts say contains comments in both Russian and Ukrainian.
Having downloaded and installed an infected version of the software for further investigation, Kaspersky’s workers reveal that a Bash stealer is deployed to collect information such as system information, browsing history, saved passwords, cryptocurrency wallet files, and credentials for cloud services – specifically, AWS, Google Cloud, Oracle Cloud Infrastructure, Azure.
Fortunately, the researchers also revealed how the malicious version of the software had been distributed. They confirmed that the official website and its content had not been compromised, and actually, the infostealing version had been posted to online communities like Reddit and StackOverflow over a period of around two years.
The genuine makers of Free Download Manager have since been notified by Kaspersky, though at the time of writing, they had not responded.
According to Kaspersky, the threat actor targeted Linux machines specifically because they are much less frequently analyzed compared with Windows and macOS devices, simply due to popularity reasons.
Still, there are some very easy steps that users can take to protect themselves online. Most importantly, users should only download from legitimate sources and check things like domains and email addresses against what has been verified as legitimate. Doing so would have saved victims from this case of malware.
More from TechRadar Pro
An infostealing malware campaign has been underway for at least three years, going completely unnoticed, Russian cybersecurity firm Kaspersky has revealed. The finding came after the company decided to take a closer look at the growing number of Linux-based attacks, which “can operate for years without being noticed by the…
Recent Posts
- Top digital loan firm security slip-up puts data of 36 million users at risk
- Nvidia admits some early RTX 5080 cards are missing ROPs, too
- I tried ChatGPT’s Dall-E 3 image generator and these 5 tips will help you get the most from your AI creations
- Gabby Petito murder documentary sparks viewer backlash after it uses fake AI voiceover
- The quirky Alarmo clock is no longer exclusive to Nintendo’s online store
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010