Skip to main content

An unauthorized, data-stealing version of FileZilla is in circulation on the ‘net

unauthorized versions filezilla steal data circulation
Image used with permission by copyright holder

If you were thinking of snagging FileZilla, the free, open source FTP manager, you better do so from the program’s official website. Otherwise, you might be laying out a welcome mat for cybercriminals to steal your data.

A blog post on FileZilla’s official site notes that altered versions of the program are popping up on third party site, laced with malware designed to swipe data from you. Though the post notes that threats like these aren’t exactly new, this new instance of blighted FileZilla programs is the “largest to date.”

“We do not condone these actions and are taking measures to get the known offenders removed,” writes FileZilla on its website. “Note that we cannot in general prevent tainted versions on third-party websites or proof their authenticity, especially since the FileZilla Project promotes beneficial redistribution and modifications of FileZilla in the spirit of free open source software and the GNU General Public License.”

Security firm Avast noted in a blog post of its own that the data-stealing version of FileZilla is “fully functional,” while also stating that its very difficult to tell the difference between legitimate and malicious versions of the program just with the naked eye alone. To help users who might be infected, FileZilla includes on its site instructions on how to check whether the version you’re running is less than pure by looking up the SHA-512 hash to make sure it matches the official version.

Of course, an easier and quicker way to deal with the problem is to simply go to filezilla-project.org and download the program directly from its creators, while also wiping your current install immediately.

What do you think? Sound off in the comments below.

(Image via Benoit Daoust/Shutterstock)

Konrad Krawczyk
Former Digital Trends Contributor
Konrad covers desktops, laptops, tablets, sports tech and subjects in between for Digital Trends. Prior to joining DT, he…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more