JDownloader Website Hacked to Replace Installers With Python RAT Malware

Related

Attackers Abuse Google Ads and Claude.ai Shared Chats to Push Mac Malware

What happened An active malvertising campaign is abusing Google sponsored...

New TCLBanker Malware Self-Spreads Over WhatsApp and Outlook

What happened Elastic Security Labs has documented a new Brazilian...

Australia Warns of ClickFix Attacks Pushing Vidar Stealer Malware

What happened The Australian Signals Directorate’s Australian Cyber Security Centre...

North Korean Hackers Targeted Ethnic Koreans in China With Android Malware

What happened ESET researchers have attributed a supply chain attack...

Telegram Mini Apps Abused for Crypto Scams and Android Malware Delivery

What happened CTM360 researchers have uncovered a large-scale fraud operation...

Share

What happened

The official JDownloader website was compromised between May 6 and May 7, 2026, with attackers replacing Windows and Linux installer download links with malicious payloads. JDownloader is a widely used free download manager with millions of users across Windows, Linux, and macOS. The developers took the website offline after the compromise was confirmed and have since published an incident report.

Attackers exploited an unpatched vulnerability in the website’s content management system that allowed them to modify access control lists and content without authentication. Only the alternative Windows installer download links and the Linux shell installer link were affected. In-app updates, macOS downloads, Flatpak, Winget, Snap packages, and the main JDownloader JAR package were not modified. The attackers did not gain access to the underlying server or host filesystem.

The malicious Windows payload acts as a loader that deploys a heavily obfuscated Python-based RAT functioning as a modular bot framework, allowing attackers to execute Python code delivered from C2 servers at parkspringshotel[.]com and auraguest[.]lk. The malicious Linux shell installer contains injected code that downloads an archive from checkinnhotels[.]com disguised as an SVG file, extracts two ELF binaries, installs one as a SUID-root binary, establishes persistence through /etc/profile.d/systemd.sh, and masquerades as a legitimate system process. The Linux payload is obfuscated using Pyarmor. JDownloader’s developers advised users to verify installer legitimacy by checking the Digital Signatures tab in file properties for an “AppWork GmbH” signature, and to treat any unsigned or differently signed installer as malicious.

The JDownloader compromise follows similar attacks on the CPUID website in April and the DAEMON Tools website earlier this month.

Who is affected

Users who downloaded and executed JDownloader Windows alternative installers or the Linux shell installer from the official website between May 6 and May 7, 2026 are directly at risk. Given the RAT’s modular design and arbitrary code execution capability, the scope of potential compromise on affected systems is broad.

Why CISOs should care

Three official software distribution websites have been compromised in rapid succession in May 2026 alone, following DAEMON Tools and CPUID. The pattern of targeting popular utility software websites to swap out legitimate installers for malware is accelerating. For organizations where employees download utilities from official vendor websites without additional integrity verification, this represents a meaningful and underweighted attack surface. The JDownloader compromise is also notable for exploiting a CMS vulnerability that required no authentication, a class of weakness that affects a large proportion of software project websites.

3 practical actions

  1. Immediately identify and isolate any systems where affected JDownloader installers were executed between May 6 and May 7: The developers’ advice is to reinstall the operating system on affected machines given that arbitrary code execution is confirmed. Treat this as a full compromise requiring OS reinstallation rather than a malware removal exercise, and rotate all credentials on affected devices after cleaning.
  2. Block the confirmed C2 domains at the network perimeter: Add parkspringshotel[.]com, auraguest[.]lk, and checkinnhotels[.]com to DNS blocklists immediately and review network logs for existing outbound connections to these domains that may indicate active infections.
  3. Implement software installer verification policies that require digital signature validation before execution: JDownloader’s developers provided a clear verification method: check the Digital Signatures tab for AppWork GmbH as the signer. Extend this practice organizationally by requiring employees to verify publisher signatures on all downloaded installers before execution, and consider deploying application control policies that block execution of unsigned or improperly signed executables.

Also in the news today:

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts