- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.
The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.
Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.
Im curious as to how it would achieve that?
It can’t split a file before it has the file. And all downloads are split up. They’re called packets.
Not saying it doesn’t do it, just wondering how.
It could make multiple requests to the server, asking each request to resume starting at a certain byte.
Interesting.
I feel I’ll save this rabbit hole for weekend and go and have a look at what they do.
The key thing to know is that a client can do an HTTP
HEAD
request to get just theContent-Length
of the file, and then performGET
requests with theRange
request header to fetch a specific chunk of a file.This mechanism was introduced in HTTP 1.1 (byte-serving).
Huh… that’s super interesting and thanks for sharing.