A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.
The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.
Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.
“Non-free download manager”
You allways pay with something
malicious Debian package repository
*laughs in RPM*
This comment was presented by the fedora gang.
Right, but you could do the same with RPM. Not everyone is aware of this, but installing a package executes scripts with root access over your system.
Thanks Captain Obvious.
Now I need to know who the hell has installed Free Download Manager on Linux.
The same people that would have given that poor nigerian prince their bank account details
And via a website too. That’s like pushing a car. One of the main strengths of Linux are open repositories, maintained by reputable sources and checked by thousands of reputable people. Packages are checksummed and therefore unable to be switched by malicious parties. Even the AUR is arguably a safer and more regulated source. And it’s actually in there.
And via a website too
Everyone knows real admins do
curl https://raw.githubusercontent.com/something/or/other/install.sh | sudo bash
Finally linux is getting popular enough to make viruses. Yay?. Insert gru meme here
Linux has had viruses for decades
Here is a list of some of the more prominent ones:
(I’m sorry. I’m also reading the same discussion over at the other post with Linux at the workplace.)
Is anything on that list relevant in the wild? That is, are those viruses ‘in theory’, or have they inflicted some damage and actually spread back then? I’m looking for some news articles or actual numbers.