Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
macOS Malware Spread via Google Ads & Claude.ai Leverages Legitimate
May 11, 2026
Google reCAPTCHA Update Blocks Privacy-Focused Android
May 11, 2026
Vidar Malware Steals Browser Credentials, Wallets &
May 11, 2026
Home/Threats/JDownloader Hacked to Infect Users with New Python RAT
Threats

JDownloader Hacked to Infect Users with New Python RAT

A severe supply chain attack targeted JDownloader, the open-source download manager used by millions globally, in early May 2026. Threat actors compromised the official jdownloader.org website,...

David kimber
David kimber
May 11, 2026 4 Min Read
2 0

A severe supply chain attack targeted JDownloader, the open-source download manager used by millions globally, in early May 2026. Threat actors compromised the official jdownloader.org website, replacing legitimate installer links with malicious files. These files delivered a fully functional Python-based remote access trojan to unsuspecting users.

Anyone who downloaded what they believed to be a standard installer during a narrow two-day window may have unknowingly installed a dangerous and persistent backdoor directly onto their machine.

The attack did not tamper with JDownloader’s actual software or its in-app update system. Instead, it targeted the website’s download links, specifically the “Download Alternative Installer” options for Windows and the Linux shell installer link.

Users who clicked those links between May 6th and 7th, 2026 received files that looked like the real thing but were in fact unsigned wrappers concealing a layered malicious payload. The deception was convincing enough that many users bypassed Windows SmartScreen warnings, believing the alerts to be nothing more than false positives.

Researchers and developers at jdownloader.org confirmed the compromise after a Reddit user named PrinceOfNightSky flagged suspicious behavior on May 7th, 2026, noting that the downloaded executables were being attributed to publishers called “Zipline LLC” and “The Water Team” rather than the legitimate developer AppWork GmbH.

The team took the website offline within hours, at 17:24 UTC, and began a full investigation. By the night of May 8th into May 9th, the site was restored with verified clean links after all malicious content was removed and server configurations were hardened against future abuse.

JDownloader Downloader Hacked

The attack was traced to an unpatched vulnerability in the website’s content management system, which allowed attackers to change access control lists without authentication and modify specific pages.

Logs revealed that the attackers even ran a dry run on a low-traffic test page on May 5th before swapping the live installer links the following day. The entire operation showed careful planning and patience, which is a hallmark of sophisticated threat actors operating with a clear intent to infect as many users as possible.

Community researcher Takia_Gecko performed deep technical analysis of the malicious installer samples and revealed a chilling level of sophistication. The fake installer was an unsigned wrapper that bundled the real, legitimate JDownloader installer alongside a second, XOR-encrypted malicious executable.

That hidden executable was decoded using the XOR key “ectb” to reveal a Windows x64 loader, which then decrypted further resources using the key “fywo” to unpack a PyArmor 8-protected Python 3.14 payload.

The final payload was a full remote access trojan framework written in Python. It used RSA-OAEP and AES-GCM encryption to communicate with its command-and-control servers, supported dead drop resolvers through platforms including Telegraph, Rentry, Codeberg, and onion addresses, and used RC4 encryption with the key “Chahgh4a” to decode live C2 URLs. The trojan hosted itself under pythonw.exe and gave attackers the ability to push and execute arbitrary Python code on any infected machine at will.

What Affected Users Should Do Now

The most critical piece of advice from jdownloader.org is clear: if you downloaded and ran one of the affected installers, perform a full clean reinstall of your operating system. Antivirus scans may catch some threats, but they cannot guarantee removal of every persistence mechanism the malware may have established.

Several users who ran full scans with tools including Malwarebytes and Windows Defender Offline found no detections, which suggests the malware is capable of hiding its presence effectively on compromised systems.

If you still have the downloaded file and have not run it, do not execute it. Instead, verify the digital signature by right-clicking the file, going to Properties, and checking the Digital Signatures tab.

Genuine JDownloader installers are signed by AppWork GmbH. Any unknown publisher or a missing signature is a strong red flag. Until you are confident your system is clean, avoid logging into sensitive accounts from the affected machine and change all important passwords from a separate, trusted device.

Indicators of Compromise (IoCs):-

Type Indicator Description
SHA256 6d975c05ef7a164707fa359284a31bfe0b1681fe0319819cb9e2c4eec2a1a8af Malicious Linux shell installer (JDownloader2Setup_unix_nojre.sh, 7,934,496 bytes) 
SHA256 fb1e3fe4d18927ff82cffb3f82a0b4ffb7280c85db5a8a8b6f6a1ac30a7e7ed9 Malicious Windows AMD64 installer v11.0.30 (104,910,336 bytes) 
SHA256 04cb9f0bca6e0e4ed30bc92726590724bf60938440b3825252657d1b3af45495 Malicious Windows AMD64 installer v17.0.18 (101,420,032 bytes) 
SHA256 5a6636ce490789d7f26aaa86e50bd65c7330f8e6a7c32418740c1d009fb12ef3 Malicious Windows AMD64 installer v1.8.0.482 (61,749,248 bytes) 
SHA256 32891c0080442bf0a0c5658ada2c3845435b4e09b114599a516248723aad7805 Malicious Windows AMD64 installer v21.0.10 (107,124,736 bytes) 
SHA256 de8b2bdfc61d63585329b8cfca2a012476b46387435410b995aeae5b502bd95e Malicious Windows x86 installer v11.0.29 (87,157,760 bytes) 
SHA256 e4a20f746b7dd19b8d9601b884e67c8166ea9676b917adea6833b695ba13de16 Malicious Windows x86 installer v17.0.17 (86,576,128 bytes) 
SHA256 4ff7eec9e69b6008b77de1b6e5c0d18aa717f625458d80da610cb170c784e97c Malicious Windows x86 installer v1.8.0.472 (62,498,304 bytes) 
URL https://parkspringshotel[.]com/m/Lu6aeloo.php Live C2 server URL decoded via RC4 key “Chahgh4a” 
URL https://auraguest.lk/m/douV2quu[.]php Live C2 server URL decoded via RC4 key “Chahgh4a” 
Registry Key HKCUSOFTWAREPython Persistence config staging location used by the loader 
Process pythonw.exe Host process for the resident Python RAT payload 
XOR Key ectb Key used to decrypt malicious PE from wrapper resource 
XOR Key fywo Key used to decrypt obfuscated PyArmor resources in loader 
RC4 Key Chahgh4a Key used to decrypt dead drop C2 resolver content 
Publisher (Fake) Zipline LLC Fraudulent code-signing publisher observed on malicious installer 
Publisher (Fake) The Water Team Second fraudulent publisher name seen on malicious installer 

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarePatchThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Top 10 Best Interactive Malware Analysis Tools for

Next Post

Vidar Malware Steals Browser Credentials, Wallets &

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
10 Best Full Disk Encryption Tools in 2026
May 11, 2026
ODINI Malware Breaches Air-Gapped Exploits Magnetic
May 11, 2026
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us