87

cross-posted from: https://lemmy.ml/post/4810462

A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

you are viewing a single comment's thread
view the rest of the comments
[-] pimento64@sopuli.xyz 46 points 1 year ago

Bad news for the 3 or 4 people out there who didn't just use the package manager to install everything.

[-] user224@lemmy.sdf.org 4 points 1 year ago

Look, I was new to ~~GNU+Linux~~ computers. But it seems I was lucky not to get redirected to that malicious repo.

[-] ArcaneSlime@lemmy.dbzer0.com 4 points 1 year ago

I've had to compile a few things I've needed that weren't in my repos, like jackett, but I go to the project's git.

[-] odium@programming.dev 4 points 1 year ago

I've been forced to install from a website for an uncommon printer driver. It was from the official canon website tho.

this post was submitted on 12 Sep 2023
87 points (96.8% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54443 readers
209 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS