Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

131 Chrome extensions found to be hijacking WhatsApp Web in massive spam campaign

£20m science and technology boost supports regional innovation

UK to create 860,000 clean energy jobs by 2030

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious GO modules pose as SSH brute force tool and steal credentials via Telegram bot
Identity

Malicious GO modules pose as SSH brute force tool and steal credentials via Telegram bot

userBy userAugust 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 24, 2025Ravi LakshmananMalware/Supply Chain Security

SSH Brute Force Tool

Cybersecurity researchers have discovered a malicious GO module that presents its status as a brute force tool for SSH, but in reality it includes the ability to carefully remove credentials from its creators.

“In the first successful login, the package sends the target IP address, username and password to a hard-coded telegram bot controlled by the threat actor,” said Socket researcher Kirill Boychenko.

The deceptive package named “Golang-Random-IP-Ssh-Bruteforce” is linked to a Github account called Illdieanyway (G3TT) that is currently inaccessible. However, it is still available at Pkg.go[.]Developer. It was released on June 24th, 2022.

The software supply chain security company said the GO module works by scanning random IPv4 addresses of publicly available SSH services on TCP port 22, brute-force the service using a built-in username password list, and removing successful credentials to the attacker.

A notable aspect of malware is that by setting “ssh.insecureignorehostkey” as Hostkeycallback, it intentionally disables host key verification, which allows the SSH client to accept connections from any server, regardless of identity.

WordList is fairly simple, with only two username routes and an admin. It also pairs weak passwords such as root, test, password, administrator, 12345678, 1234, QWERTY, WebAdmin, Webmaster, TechSupport, LetMein, PassW@rd.

Identity Security Risk Assessment

The malicious code runs in an infinite loop to generate an IPv4 address, and the package attempts simultaneous SSH logins from the WordList.

Details will be sent via the API to a threat actor controlled telegram bot named “@sshzxc_bot” (ssh_bot) to allow for the receipt of credentials. The message is sent to the account via the bot using the handle “@io_ping” (gett).

SSH Brute Force Tool

The currently deleted Internet archive snapshots of GitHub accounts show that G3TT’s software portfolio (also known as G3TT’s software portfolio) includes an IP port scanner, Instagram profile information and media parser, as well as a PHP-based command and control (C2) botnet called SELICA-C2.

Their YouTube channel remains accessible and hosts a variety of short form videos that they claim to be “how to hack a Telegram Bot” and “the most powerful SMS bomber in the Russian Federation.” The threat leader is rated as Russian origin.

“This package infers scans and password guesses to unconscious operators, spreads risks across the IPS, and leaks success to a single threat actor-controlled telegram bot,” says Boychenko.

“Disables host key verification, drives high concurrency after the first enabled login, and prioritizes quick capture. As TelegramBotAPI uses HTTPS, traffic looks like a normal web request and can pass through coarse output controls.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNASA’s patient rover spies on Mars with a mysterious “helmet” (Photo)
Next Article iPhone 17, “the thinnest iPhone ever” and everything else we expect from Apple’s hardware events
user
  • Website

Related Posts

131 Chrome extensions found to be hijacking WhatsApp Web in massive spam campaign

October 20, 2025

MSS claims NSA used 42 cyber tools in multi-stage attack on Beijing Time System

October 20, 2025

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

131 Chrome extensions found to be hijacking WhatsApp Web in massive spam campaign

£20m science and technology boost supports regional innovation

UK to create 860,000 clean energy jobs by 2030

The man who bet everything on AI and Bill Belichick

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.