Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Malicious GO Exploits Module Mirror Cathing for Permanent Remote Access
Global Security

Malicious GO Exploits Module Mirror Cathing for Permanent Remote Access

AdminBy AdminFebruary 4, 2025No Comments2 Mins Read
Malicious Go Package
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


04 February 2025Red LakshmananVulnerability / intelligence threats

A malicious package Go

Cybersecurity researchers drew attention to the attack chain of software supplies aimed at the GO ecosystem, which includes a malicious package, capable of providing the enemy remote access to infected systems.

The package called github.com/boltdb- Go/boltis the type of legal database boltdb (github.com/boltdb/bolt), for the socket. The malicious version (1.3.1) was published by GitHub in November 2021, after which it was cached endlessly long GO MODULE MIRROR Service.

“After installing the rear package gives actors threatening remote access to the infected system, allowing them to perform arbitrary teams,” Cyril Boychenko researchers – Note In the analysis.

Socket said the development notes one of the earliest cases of a malicious actor who abuses uncertain module module module to cheat users in the package load. Subsequently, the attacker is said to change the GIT Tags in the source storage facility to redirect them to a benign version.

Cybersecurity

Such a deceptive approach ensured that a hand -held gitHub repository does not detect any harmful contents, while the caching mechanism meant that nothing suspicious developers that install the package using CLI continued to load the posterior version.

“Once the module version is cached, it remains accessible through the proxy -Module Go, even if the original source is later changed,” Boychenko said. “Although this design benefits the legitimate use of cases, the actor of the threat used it to distribute the malicious code, despite the subsequent changes to the repository.”

A malicious package Go

“With the help of unchanged modules that offer both safety and potential abuse vectors, developers and security groups should monitor the attacks that use cached versions of the module to avoid detection.”

Development comes as ticico minute Three malicious NPM-Korol packages, OpenSSL-Node and Next-Refresh-Token-Taken have a persistent code to collect system metadata and launch arbitrary commands issued by a remote server (“8.152.163 () 60”) on the infected host.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.