A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

    • 30p87@feddit.de
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      And via a website too. That’s like pushing a car. One of the main strengths of Linux are open repositories, maintained by reputable sources and checked by thousands of reputable people. Packages are checksummed and therefore unable to be switched by malicious parties. Even the AUR is arguably a safer and more regulated source. And it’s actually in there.

      • JWBananas@startrek.website
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        And via a website too

        Everyone knows real admins do curl https://raw.githubusercontent.com/something/or/other/install.sh | sudo bash

    • xkforce@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      The same people that would have given that poor nigerian prince their bank account details