cross-posted from: https://lemmy.ml/post/4810462
A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.
The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.
Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.
Bad news for the 3 or 4 people out there who didn’t just use the package manager to install everything.
I’ve been forced to install from a website for an uncommon printer driver. It was from the official canon website tho.
I’ve had to compile a few things I’ve needed that weren’t in my repos, like jackett, but I go to the project’s git.
Look, I was new to
GNU+Linuxcomputers. But it seems I was lucky not to get redirected to that malicious repo.