Another example of why it's a good idea to never let your guard down, even on Linux. https://www.bleepingcomputer.com/ne...-redirected-linux-users-to-malware-for-years/
I'm surprised that none of you Linux fans have responded. How would you have tackled this on your system?
For one I wouldn't have encountered this problem, I don't use download managers. For two I have never used Debian. see my signature for what I use. For three, a lot of that code shown will fail due to permissions. A user would not have access for example /root/ the command ip would fail as only root can run it. The parts that may succeed would only have that users info, most of it not worth much.
As opposed to Windows users, the majority of Linux users don't get their software from random websites. When I absolutely feel the need to do so, I'll do my research first. I would never fall for a shady "Download Manager", aimed at Linux. The native open source ones from the repo's do just fine, e.g. axel or aria2: Code: aria2c -x 8 http://www.example.com/example.file (downloads 'example.file' using 8 connections) There is also the browser extension DownThemAll.
I see your point of view, but that's not exactly what I meant. I just wondered IF you would have dowloaded such a trojanized version, would Linux (in this case Debian) have built-in security tools to mitigate this? And keep in mind that a firewall would not have helped since all download managers need network access in order to work, obviously. Except for that this wasn't a random site? It was the official website that was hacked, but like you said, Linux users may not be used to downloading software from websites, similar to how probably a lot of macOS users rely on the Mac App Store.