

Social network users discussing Free Download Manager issues did not suspect that they were caused by malware.Infections with the malicious Debian package occurred with a degree of probability: some users received the infected package, while others ended up downloading the benign one.As opposed to Windows, Linux malware is much more rarely observed.Given these facts, it may seem paradoxical that the malicious Free Download Manager package remained undetected for more than three years. According to our telemetry, victims of this campaign are located all over the world, including Brazil, China, Saudi Arabia and Russia.

In addition, the implants turned out to be quite noisy, as demonstrated by multiple posts on social networks. The malware observed in this campaign has been known since 2013. “While the campaign is currently inactive,” the researchers wrote, referring to the recent incident, “this case of Free Download Manager demonstrates that it can be quite difficult to detect ongoing cyber attacks on Linux machines to the naked eye.” They added: The stealer called by the backdoor was installed in a 2019 campaign after first exploiting a vulnerability in the Exim Mail Server.

Bew was one of the components used in an attack in 2017. The backdoor is an updated version of malware tracked as Bew, which was published in 2014. The malicious redirects ended in 2022 for unknown reasons.
#Passwords manager safari software
It’s unclear why some visitors received the non-malicious version of the software and others were redirected to a malicious domain. The image below illustrates the infection chain. It then uses this binary to upload stealer execution results to the attackers’ infrastructure.”

“After collecting information from the infected machine, the stealer downloads an uploader binary from the C2 server, saving it to /var/tmp/atd. “This stealer collects data such as system information, browsing history, saved passwords, cryptocurrency wallet files, as well as credentials for cloud services (AWS, Google Cloud, Oracle Cloud Infrastructure, Azure),” the researchers wrote in a report on Tuesday. Researchers from Kaspersky, the security firm that discovered the malware, then ran the backdoor on a lab device to observe how it behaved. With that, devices that had installed the booby-trapped version of Free Download Manager were permanently backdoored.Īfter accessing an IP address for the malicious domain, the backdoor launched a reverse shell that allowed the attackers to remotely control the infected device. The script then used the cron job scheduler to cause the file at /var/tmp/crond to launch every 10 minutes. The version available on the malicious domain contained a script that downloaded two executable files to the /var/tmp/crond and /var/tmp/bs file paths. Starting in 2020, the same domain at times redirected users to the domain deb.fdmpkgorg, which served a malicious version of the app. The site, freedownloadmanagerorg, offered a benign version of a Linux offering known as the Free Download Manager. Getty Images | posteriori reader comments 103 withĪ download site surreptitiously served Linux users malware that stole passwords and other sensitive information for more than three years until it finally went quiet, researchers said on Tuesday.
