🅰🅳🅼
4.7K posts







0e11c4aa285dffe95d2d7e90d974ad0e72336549b0dd2161dec606ba4955e2e1 qemu.c







🚨 WARNING: The official JDownloader website was compromised earlier this week to distribute malicious Windows and Linux installers that deployed Python-based malware on infected systems. The supply chain attack impacted users who downloaded installers from the site between May 6 and May 7 via the “Download Alternative Installer” links on Windows or the Linux shell installer. What happened: 🔴Attackers breached the JDownloader site via an unpatched security flaw. 🔴Attackers then modified JDownloader download links to point to malicious payloads 🔴The Windows malware deployed a heavily obfuscated Python-based RAT framework @thomasklemenc found that the Windows malware deployed a Python RAT that can execute attacker-supplied Python code remotely. BleepingComputer's analysis of the Linux installer also revealed injected code that downloaded additional malware, installed a SUID-root launcher, and disguised the payload as /usr/libexec/upowerd.









