JDownloader Installer Compromised, Delivering Python RAT via Unpatched CMS
Attackers compromised the JDownloader website between May 6-7, affecting the Windows “Download Alternative Installer” links and the Linux shell installer. Malwarebytes Blog reports that during this window, users downloading these installers received a Python-based Remote Access Trojan (RAT) instead of the legitimate software. This supply chain attack did not impact macOS, JAR files, Flatpak, Winget, or Snap packages, nor did it affect users applying updates during the period.
The breach vector was an unpatched Content Management System (CMS) security bug, which allowed unauthorized modification of access control lists. Malwarebytes Blog notes that the JDownloader developers swiftly took the site offline on May 7, restoring it with verified clean installers and hardened server configurations by May 8-9. Users are advised to verify their installer’s digital signature from “AppWork GmbH,” as the malicious versions lacked this.
What This Means For You
- If your organization uses JDownloader, specifically the Windows alternative or Linux shell installer, and downloaded it between May 6-7, 2026, you must assume compromise. Immediately verify the digital signature of the installed JDownloader executable. If it lacks a valid "AppWork GmbH" signature, perform a full system scan with a trusted EDR solution and initiate incident response procedures. This is a classic supply chain attack leveraging a vulnerable CMS; ensure your public-facing web infrastructure is patched and hardened against known vulnerabilities, especially in CMS platforms.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Traffic to Compromised Vendor — JDownloader
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| JDownloader-Compromise-2026-05 | Code Injection | JDownloader installer downloads for Windows ('Download Alternative Installer' links) and Linux (shell installer) compromised between May 6-7, 2026. |
| JDownloader-Compromise-2026-05 | Misconfiguration | Unpatched CMS security bug allowing modification of access control lists without authentication on JDownloader website. |
| JDownloader-Compromise-2026-05 | Information Disclosure | Malicious JDownloader Windows installers deployed a Python-based remote access Trojan (RAT). |
| JDownloader-Compromise-2026-05 | Malware | Malicious JDownloader installers lacked digital signatures from 'AppWork GmbH'. |
| JDownloader-Compromise-2026-05 | Malware | Domains contacted by RAT: parkspringhotel[.]com |