Technology

JDownloader site hack delivers Python RAT via installers

JDownloader site – JDownloader’s official site was compromised and altered alternative download links to deliver malicious Python RAT installers for Windows and Linux.

A popular download manager became the latest software supply-chain target after its official site was compromised to push malicious installers instead of the real downloads, including a Windows payload built around a Python-based remote access trojan.

The incident centers on JDownloader’s download page being altered earlier this week. Users who pulled installers from the official website during May 6 to May 7, 2026 through specific “Download Alternative Installer” links for Windows, or via the Linux shell installer, received tampered files.

The JDownloader development team said the attackers changed the website’s download links so they pointed to malicious third-party payloads rather than legitimate installers.. JDownloader itself is a long-running. widely used free download management application that supports automated downloading from file-hosting services. video platforms. and premium link generators. and it has been in use for more than a decade across multiple operating systems.

The compromise was first noticed by a user on Reddit. who said downloaded Windows installers were being flagged by Microsoft Defender even though they came from the official site.. The user also reported that the developer information shown in Windows security checks did not match what they expected. and said they chose not to proceed with the run steps without being able to verify the signature.

After that early report, the developers confirmed the site had been compromised and took the website offline to investigate.. In their incident report. they said the attackers were able to exploit an unpatched vulnerability that allowed them to alter website access control lists and web content without authentication.

Importantly for affected users, the developers also emphasized what the attackers did not do.. They said the attackers did not gain access to the underlying server stack. and that there was no access to the host filesystem or broader operating-system-level control beyond content managed through the CMS.. In other words, the manipulation was focused on published website content, including which download links were served.

According to the team, the impact was limited to the alternative Windows installer download links and the Linux shell installer link. Other distribution routes were not altered, including in-app updates, macOS downloads, Flatpak, Winget, Snap packages, and the main JDownloader JAR package.

For users trying to verify whether a downloaded installer is genuine, the developers recommended checking the file signature in Windows.. The guidance is to right-click the installer, open Properties, and then check the Digital Signatures tab.. If the digital signature indicates it was signed by “AppWork GmbH. ” it should be treated as legitimate; if the file is not signed or is signed under a different name. it should be avoided.

Cybersecurity researcher Thomas Klemenc reviewed the malicious Windows executables and shared indicators of compromise.. His analysis described the malware as a loader that delivers a heavily obfuscated Python-based remote access trojan.. In that design. the Python component functions as a modular bot and RAT framework. enabling attackers to run Python code supplied from command-and-control infrastructure.

Klemenc also published two command-and-control server addresses observed in the malware: https://parkspringshotel[.]com/m/Lu6aeloo.php and https://auraguest[.]lk/m/douV2quu.php.. Those endpoints are notable because they show how the payload could potentially be instructed and updated after initial infection.

On the Linux side. analysis of the modified shell installer found injected malicious code that downloaded an archive from checkinnhotels[.]com disguised as an SVG file.. Once the download completes. the script extracts two ELF binaries named “pkg” and “systemd-exec. ” then installs “systemd-exec” as a SUID-root binary in /usr/bin/.

The chain doesn’t stop at installation.. The Linux process was also described as copying the main payload to /root/.local/share/.pkg. creating a persistence script in /etc/profile.d/systemd.sh. and launching the malware while masquerading as /usr/libexec/upowerd.. The “pkg” payload was also reported as heavily obfuscated using Pyarmor, leaving its exact functionality unclear from the initial review.

JDownloader’s developers said users are only at risk if they both downloaded and executed the affected installers while the site was compromised.. Still. the consequences can extend beyond mere infection: because the malware could execute arbitrary code on infected devices. the team advised those who installed the malicious packages to reinstall their operating systems.

The guidance also reaches into account security.. The developers noted that credentials could potentially be compromised as part of the attack. recommending that users reset passwords after cleaning their devices.. That dual response—wipe and re-image. then rotate credentials—reflects how RAT-style intrusions can lead to persistent access and follow-on damage.

This incident fits a broader pattern of threat actors targeting the websites of widely used software tools. turning legitimate download flows into a delivery mechanism for malware.. Earlier this year. attackers compromised CPUID’s website and changed download links for CPU-Z and HWMonitor so they served malicious executables.. More recently, threat actors also compromised the DAEMONTOOLS website to distribute trojanized installers that contained a backdoor.

For users. the most practical takeaway is procedural rather than technical: verifying signatures and being selective about which installer links are used can reduce exposure when a supply-chain compromise hits the download layer.. For the industry. the episode underscores how CMS-related access problems can become security incidents even when attackers do not reach the broader server environment. making link integrity and distribution-path protections as important as securing the application itself.

The JDownloader team has already taken steps by removing the compromised access while investigating. but the broader question now is how many machines were exposed during the short window of May 6 to May 7 and how quickly victims can restore trust in their systems.. With Python-based RAT capability and Linux persistence mechanisms described in the analysis. rapid containment and credential resets remain central for anyone who ran an installer from the affected links.

JDownloader hack Python RAT software supply chain malicious installers cybersecurity incident Linux SUID persistence Windows malware

Secret Link