JDownloader Downloader Hacked to Infect Users With New Python RAT

JDownloader, the popular open-source download manager trusted by millions of users worldwide, was at the center of a serious supply chain attack in early May 2026. Attackers quietly compromised the official jdownloader.org website and replaced legitimate installer download links with malicious files carrying a fully functional Python-based remote access trojan.

Anyone who downloaded what they believed to be a standard installer during a narrow two-day window may have unknowingly installed a dangerous and persistent backdoor directly onto their machine.

The attack did not tamper with JDownloader’s actual software or its in-app update system. Instead, it targeted the website’s download links, specifically the “Download Alternative Installer” options for Windows and the Linux shell installer link.

Users who clicked those links between May 6th and 7th, 2026 received files that looked like the real thing but were in fact unsigned wrappers concealing a layered malicious payload. The deception was convincing enough that many users bypassed Windows SmartScreen warnings, believing the alerts to be nothing more than false positives.

Researchers and developers at jdownloader.org confirmed the compromise after a Reddit user named PrinceOfNightSky flagged suspicious behavior on May 7th, 2026, noting that the downloaded executables were being attributed to publishers called “Zipline LLC” and “The Water Team” rather than the legitimate developer AppWork GmbH.

The team took the website offline within hours, at 17:24 UTC, and began a full investigation. By the night of May 8th into May 9th, the site was restored with verified clean links after all malicious content was removed and server configurations were hardened against future abuse.

JDownloader Downloader Hacked

The attack was traced to an unpatched vulnerability in the website’s content management system, which allowed attackers to change access control lists without authentication and modify specific pages.

Logs revealed that the attackers even ran a dry run on a low-traffic test page on May 5th before swapping the live installer links the following day. The entire operation showed careful planning and patience, which is a hallmark of sophisticated threat actors operating with a clear intent to infect as many users as possible.

Community researcher Takia_Gecko performed deep technical analysis of the malicious installer samples and revealed a chilling level of sophistication. The fake installer was an unsigned wrapper that bundled the real, legitimate JDownloader installer alongside a second, XOR-encrypted malicious executable.

That hidden executable was decoded using the XOR key “ectb” to reveal a Windows x64 loader, which then decrypted further resources using the key “fywo” to unpack a PyArmor 8-protected Python 3.14 payload.

The final payload was a full remote access trojan framework written in Python. It used RSA-OAEP and AES-GCM encryption to communicate with its command-and-control servers, supported dead drop resolvers through platforms including Telegraph, Rentry, Codeberg, and onion addresses, and used RC4 encryption with the key “Chahgh4a” to decode live C2 URLs. The trojan hosted itself under pythonw.exe and gave attackers the ability to push and execute arbitrary Python code on any infected machine at will.

What Affected Users Should Do Now

The most critical piece of advice from jdownloader.org is clear: if you downloaded and ran one of the affected installers, perform a full clean reinstall of your operating system. Antivirus scans may catch some threats, but they cannot guarantee removal of every persistence mechanism the malware may have established.

Several users who ran full scans with tools including Malwarebytes and Windows Defender Offline found no detections, which suggests the malware is capable of hiding its presence effectively on compromised systems.

If you still have the downloaded file and have not run it, do not execute it. Instead, verify the digital signature by right-clicking the file, going to Properties, and checking the Digital Signatures tab.

Genuine JDownloader installers are signed by AppWork GmbH. Any unknown publisher or a missing signature is a strong red flag. Until you are confident your system is clean, avoid logging into sensitive accounts from the affected machine and change all important passwords from a separate, trusted device.

Indicators of Compromise (IoCs):-

TypeIndicatorDescription
SHA2566d975c05ef7a164707fa359284a31bfe0b1681fe0319819cb9e2c4eec2a1a8afMalicious Linux shell installer (JDownloader2Setup_unix_nojre.sh, 7,934,496 bytes) 
SHA256fb1e3fe4d18927ff82cffb3f82a0b4ffb7280c85db5a8a8b6f6a1ac30a7e7ed9Malicious Windows AMD64 installer v11.0.30 (104,910,336 bytes) 
SHA25604cb9f0bca6e0e4ed30bc92726590724bf60938440b3825252657d1b3af45495Malicious Windows AMD64 installer v17.0.18 (101,420,032 bytes) 
SHA2565a6636ce490789d7f26aaa86e50bd65c7330f8e6a7c32418740c1d009fb12ef3Malicious Windows AMD64 installer v1.8.0.482 (61,749,248 bytes) 
SHA25632891c0080442bf0a0c5658ada2c3845435b4e09b114599a516248723aad7805Malicious Windows AMD64 installer v21.0.10 (107,124,736 bytes) 
SHA256de8b2bdfc61d63585329b8cfca2a012476b46387435410b995aeae5b502bd95eMalicious Windows x86 installer v11.0.29 (87,157,760 bytes) 
SHA256e4a20f746b7dd19b8d9601b884e67c8166ea9676b917adea6833b695ba13de16Malicious Windows x86 installer v17.0.17 (86,576,128 bytes) 
SHA2564ff7eec9e69b6008b77de1b6e5c0d18aa717f625458d80da610cb170c784e97cMalicious Windows x86 installer v1.8.0.472 (62,498,304 bytes) 
URLhttps://parkspringshotel[.]com/m/Lu6aeloo.phpLive C2 server URL decoded via RC4 key “Chahgh4a” 
URLhttps://auraguest.lk/m/douV2quu[.]phpLive C2 server URL decoded via RC4 key “Chahgh4a” 
Registry KeyHKCUSOFTWAREPythonPersistence config staging location used by the loader 
Processpythonw.exeHost process for the resident Python RAT payload 
XOR KeyectbKey used to decrypt malicious PE from wrapper resource 
XOR KeyfywoKey used to decrypt obfuscated PyArmor resources in loader 
RC4 KeyChahgh4aKey used to decrypt dead drop C2 resolver content 
Publisher (Fake)Zipline LLCFraudulent code-signing publisher observed on malicious installer 
Publisher (Fake)The Water TeamSecond fraudulent publisher name seen on malicious installer 

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post JDownloader Downloader Hacked to Infect Users With New Python RAT appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading