HackMyIP
← Back to News
2026-05-09 BleepingComputer

JDownloader Site Hacked, Distributing Python RAT via Fake Installers

MalwareSupply ChainThreat Intel

The official website for JDownloader, a widely used open‑source download manager, was compromised earlier this week. Attackers altered the download links for both Windows and Linux installers, swapping the legitimate executables with malicious versions that contained a Python‑based remote‑access trojan (RAT). According to researchers at BleepingComputer, the compromised Windows installer delivered a dropper that unpacked a Python RAT, enabling the adversary to execute arbitrary commands, exfiltrate files, and maintain persistence via scheduled tasks. The Linux variant followed a similar pattern, embedding a Python script that opened a reverse shell and logged credentials. Both payloads communicated with the same command‑and‑control (C2) infrastructure, suggesting a coordinated campaign. Users who installed the software from the official site between the breach window are advised to immediately remove the applications, revoke any credentials that may have been entered, and perform a full system scan with updated anti‑malware tools. Organizations should also monitor for anomalous outbound connections on ports commonly used by Python reverse shells (e.g., 4444, 8080) and review authentication logs for signs of credential misuse. This incident highlights the ongoing risk of supply‑chain attacks, where trusted distribution channels are weaponized to deliver malware at scale. Security teams should adopt code‑signing verification, checksum validation, and regular integrity checks of downloaded binaries to mitigate similar threats.

Source: BleepingComputer →

Related Tool

Privacy Checkup

Try Now →