During October 2015 the curl web site sent out 1127 gigabytes of data. This was the first time we crossed the terabyte limit within a single month.
Looking at the stats a little closer, I noticed that in July 2015 a particular single package started to get very popular. The exact URL was
Curious. In October it alone was downloaded more than 300,000 times, accounting for over 70% of the site's bandwidth. Why?
The downloads came from what appears to be different locations. They don't use any HTTP referer headers and they used different User-agent headers. I couldn't really see a search bot gone haywire or a malicious robot stuck in a crazy mode.
After I shared some of this data over in our IRC channel (#curl on freenode), Björn Stenberg stumbled over this AVG slide set, describing how a particular malware works when it infects a computer. Downloading that particular file is thus a step in its procedures to create a trojan that will run on the host system - see slide 11 for the curl details. The slide also mentions that an updated version of the malware comes bundled with the curl library already, which then I guess makes the hits we see on the curl site being done by the older versions still being run.
Of course, we can't be completely sure this is the source for the increased download of this particular file but it seems highly likely.
I renamed the file just now to see what happens.
Evil use of good code
We can of course not prevent evil uses of our code. We provide source code and we even host some binaries of curl and libcurl and both good and bad actors are able to take advantage of our offers.
This rename won't prevent a dedicated hacker, but hopefully it can prevent a few new victims from getting this malware running on their machines.
Update: the hacker news discussion about this post.