← Supply-Chain Attack Compendium

FreeDownloadManager

Incident Summary

FreeDownloadManager site served backdoored Linux version.

The official FreeDownloadManager website was compromised and intermittently redirected Linux users to a domain serving a trojanized Debian package. The malicious package installed a backdoor and infostealer aimed at passwords, crypto wallets, and cloud credentials, turning selective redirects into quiet compromise.

Date
2020-01-24 to 2022-01-01
Category
Commercial
Target Surface
Distribution
Insertion Phase
distribution
Impact
Backdoor
Cause
Website compromise

What Was Affected

Package FreeDownloadManager
Languageshell
ComponentApplication
Artifact typebinary archive
Domain typeproject download host

Compromised Versions

  • Specific Linux Debian packages distributed via malicious redirect from freedownloadmanager.org between 2020-2022

Incident Context

Motive
Financial gain
Attribution
Cybercriminal group
Transitive
No
User Impact
10000
Observed Duration
708 days

Evidence

Compromised Artifacts

Current Artifacts and Analysis

Indicators and Changes

Hashes

  • sha256:b77f63f14d0b2bde3f4f62f4323aad87194da11d71c117a487e18ff3f2cd468d
  • sha256:2214c7a0256f07ce7b7aab8f61ef9cbaff10a456c8b9f2a97d8f713abd660349
  • sha256:93358bfb6ee0caced889e94cd82f6f417965087203ca9a5fce8dc7f6e1b8a3ea
  • sha256:d73be6e13732d365412d71791e5eb1096c7bb13d6f7fd533d8c04392ca0b69b5

External References

Source Data

Source record: proprietary/freedownloadmanager/meta.yaml