<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Jdownloader — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/jdownloader/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/jdownloader/feed.xml" rel="self" type="application/rss+xml"/><item><title>JDownloader Website Compromised to Serve Malicious Installers</title><link>https://feed.craftedsignal.io/briefs/2026-10-jdownloader-supply-chain/</link><pubDate>Mon, 11 May 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-10-jdownloader-supply-chain/</guid><description>JDownloader's website was compromised on May 6-7, 2026, with download links repointed to malicious installers deploying a Remote Access Trojan on Windows and harmful shell commands on Linux. Users who installed from affected links should treat the system as fully compromised and perform a clean OS reinstall.</description><content:encoded><![CDATA[<p>JDownloader, a widely used open-source download manager, had its official website compromised between May 5–7, 2026. Attackers gained access to the site&rsquo;s CMS and repointed specific installer download links to malicious third-party files — they did not modify the legitimate installer packages themselves, only the links serving them. The affected download paths were the Windows &ldquo;Download Alternative Installer&rdquo; links and the Linux shell-based installer. Both Windows and Linux variants contained a Remote Access Trojan (RAT); the Windows executables additionally lack the legitimate &ldquo;AppWork GmbH&rdquo; code signature present on all genuine JDownloader installers. Crucially, in-app updates were unaffected because JDownloader&rsquo;s update mechanism uses RSA signature verification.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attackers gained unauthorized access to JDownloader&rsquo;s website CMS.</li>
<li>On May 5, 23:55 UTC, the attackers tested their approach on a low-traffic page.</li>
<li>On May 6, ~00:01 UTC, live download links for the Windows &ldquo;Alternative Installer&rdquo; variants and the Linux shell installer were repointed to attacker-controlled files hosted externally.</li>
<li>A user visiting jdownloader.org and clicking one of the affected download links received a malicious installer silently replacing the legitimate one.</li>
<li>On Windows, the malicious executable lacks the AppWork GmbH code signature but proceeds to execute as an installer; on Linux, the shell script runs harmful commands inline during installation.</li>
<li>The RAT is deployed, providing attackers with persistent remote access to the victim system.</li>
<li>On May 7, 17:06 UTC, the compromise was reported via Reddit; JDownloader shut down their servers at 17:24 UTC to stop distribution.</li>
<li>Clean, verified installers were restored on May 8–9 UTC.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Any user who downloaded and executed a JDownloader installer via the website&rsquo;s &ldquo;Alternative Installer&rdquo; or Linux shell links between May 6 00:01 UTC and May 7 17:24 UTC should consider their system fully compromised. The deployed RAT grants attackers remote command execution, enabling credential theft, lateral movement, data exfiltration, and persistence. The JDownloader team explicitly recommends a clean OS reinstall for affected systems and warns against performing sensitive operations (banking, password management) until a clean environment is confirmed. Users who installed via the standard (non-alternative) Windows installer, macOS installer, or used in-app updates are not affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>If JDownloader was installed during May 6–7, 2026 via the &ldquo;Alternative Installer&rdquo; or Linux shell links, perform a clean OS reinstall — do not attempt to remove the malware in-place.</li>
<li>Change all passwords (email, banking, credentials managers) from a separate, verified-clean device before accessing any accounts on the potentially compromised system.</li>
<li>Block the IOC hashes listed above in your EDR and file integrity monitoring tooling.</li>
<li>Deploy the Sigma rule &ldquo;Execution of Known Malicious JDownloader Installer by Hash&rdquo; to identify any historical execution of these installers in your environment.</li>
<li>Deploy the Sigma rule &ldquo;Unsigned JDownloader Installer Execution&rdquo; as an ongoing detection for future cases where JDownloader is installed without AppWork GmbH&rsquo;s code signature.</li>
<li>Verify JDownloader installations in your estate by checking installer hashes or confirming the code signature on the <code>JDownloader2Setup_*.exe</code> binary against the AppWork GmbH certificate.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>rat</category><category>windows</category><category>linux</category><category>jdownloader</category></item></channel></rss>