Password-stealing Linux malware served for 3 years and no one noticed (Ars Technica)
The site, freedownloadmanager[.]org, offered a benign version of a Linux offering known as the Free Download Manager. Starting in 2020, the same domain at times redirected users to the domain deb.fdmpkg[.]org, which served a malicious version of the app. The version available on the malicious domain contained a script that downloaded two executable files to the /var/tmp/crond and /var/tmp/bs file paths. The script then used the cron job scheduler to cause the file at /var/tmp/crond to launch every 10 minutes. With that, devices that had installed the booby-trapped version of Free Download Manager were permanently backdoored.
Posted Sep 14, 2023 12:56 UTC (Thu)
by wittenberg (subscriber, #4473)
[Link]
https://dl.acm.org/doi/10.1145/358198.358210
In order to trust a system, you have to trust everything the system is built on, including the hardware, the OS, the compiler and so on. That means not only trusting the author, but also trusting all the tools he used. That's a whole lot of people you have to trust. That's one reason security is hard.
--David
Posted Sep 15, 2023 14:17 UTC (Fri)
by FDM_team (guest, #166968)
[Link] (3 responses)
Posted Sep 15, 2023 14:29 UTC (Fri)
by rahulsundaram (subscriber, #21946)
[Link] (2 responses)
Posted Sep 15, 2023 15:21 UTC (Fri)
by Wol (subscriber, #4433)
[Link] (1 responses)
And no, they don't have a time machine. As I read the message, the information you are asking for is not *currently* available. Which is why it's not there - quelle surprise.
Whether they'll post it when they have it, I don't know. But don't jump the gun, please.
(Unless, given your name, English is not your first language and you've used the wrong present tense, in which case sorry ...)
Cheers,
Posted Sep 15, 2023 15:56 UTC (Fri)
by rahulsundaram (subscriber, #21946)
[Link]
> And no, they don't have a time machine. As I read the message, the information you are asking for is not *currently* available. Which is why it's not there - quelle surprise.
The report is available but it isn't being linked to. They note that the security issue was fixed accidentally but don't go into the details as to how. None of that requires any kind of time machine
Posted Sep 21, 2023 9:12 UTC (Thu)
by FDM_team (guest, #166968)
[Link]
Password-stealing Linux malware served for 3 years and no one noticed (Ars Technica)
Password-stealing Linux malware served for 3 years and no one noticed (Ars Technica)
Password-stealing Linux malware served for 3 years and no one noticed (Ars Technica)
Password-stealing Linux malware served for 3 years and no one noticed (Ars Technica)
Wol
Password-stealing Linux malware served for 3 years and no one noticed (Ars Technica)
Password-stealing Linux malware served for 3 years and no one noticed (Ars Technica)
We once again sincerely apologize for any inconvenience that might have been caused.