Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Malicious GO modules provide disk malicious programs
Global Security

Malicious GO modules provide disk malicious programs

AdminBy AdminMay 3, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


03 May 2025Red LakshmananAttack of supply chain / malicious software

Cybersecurity researchers have discovered three harmful Go Modules, which include embarrassed code to get a useful load to the next stage that can irrevitate the basic Linux disc and make it unsolvable.

Package names are given below –

  • GITHUB (.) Com/TRUEFULPHAM/Prototransform
  • GitHub (.) Com/Blankloggia/Go-MCP
  • GitHub (.) Com/Steelpoor/TLSPROXY

‘Although the legal appeared, these modules were held high clouded code Designed to obtain and execute distant useful loads “Research Package Kush Rada – Note.

Packages are designed to check if the operating system they work on Linux, and if so, get a useful load at the next stage from the remote server using WGET.

Useful load is a devastating shell script that rewrites the entire primary disk (“/Dev/sda“) With scratch, effectively preventing the loading of the machine.

“This devastating method does not provide any data restoration tool or forensic examination, because they directly and irrewriting it,” said the hood.

Cybersecurity

“This malicious scenario leaves the targeted Linux servers or in the developers’ environments completely crippled, emphasizing the extraordinary danger that modern supplies chain that can turn a seemingly trusted code into devastating threats are.”

The disclosure of information occurs when several malicious NPM packets were discovered in the register with features for theft of mneumonic seminal phrases and private cryptocurrency keys and sensitive data. List packages identified Socket. Sonataand Firmer below –

  • Crypto-ancrypt-ts
  • React-Native-ScrollPageviewtest
  • BankingBundleserv
  • BUTTONFACTORYSERV-PAYPAL
  • Tommyboytesting
  • Compliancereadserv-PayPal
  • Oauth2-PayPal
  • Palepiplatformservice-PayPal
  • Userbridge-PayPal
  • Userrelationship-PayPal

Packages closed by malicious programs focused on cryptocurrency wallets were also found in the Python Package (PYPI) repositories –web3x and hewalletbot-with siphon-mneated seed phrases. Since the publication in 2024, these packages have been combined more than 6800 times.

There was another set of seven pypi packages find Using the SMTP Gmail SMTP and WebSockets servers for data expressing and deleted command execution in an effort to avoid detecting. Packages that have been removed since then –

  • CFC-BSB (2913 boot)
  • Coffin2022 (6571 boot)
  • Town codes-2012 (18126 boot)
  • Code-Codes-Net (6144 boot)
  • Code-Codes-Net2 (6238 boot)
  • CODE-CODES-PRO (9,012 boot)
  • Coffin-Grave (6544 boot)

The packages use Gmail account accounts to log on to the SMTP Service server and send a message to another Gmail address to signal a successful compromise. In the future, they install the WebSocket connection to install a two -legged communication channel.

Cybersecurity

The threatening actors will use the trust associated with the Gmail domains (“SMTP.gmail (.) COM”) and the fact that corporate trusts and final points protection are unlikely to specify it as suspicious, making it hidden and reliable.

A package that is besides the rest, is a CFC-BSB that lacks Gmail functionality but includes WebSocket logic to alleviate remote access.

In order to mitigate the risk that such supply chain threats, the developers are advised to check the authenticity of the package, check out the publisher’s history and links to GitHub; Audit dependence regularly; and make rigorous access control on private keys.

“Keep track of the unusual weekend, especially the SMTP traffic, as attackers can use legal services such as Gmail to steal sensitive data,” said Socket Olivia Brown researcher. “Do not trust the package solely because it has existed for more than a few years without removing.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.