Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI announces GPT-5.4-Cyber ​​with expanded access for security teams

Anthropic’s rise is causing some OpenAI investors to have second thoughts

Someone has put a backdoor into dozens of WordPress plugins used by thousands of websites.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious Go crypto module steals passwords and deploys Rekoobe backdoor
Identity

Malicious Go crypto module steals passwords and deploys Rekoobe backdoor

By February 27, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 27, 2026Malware / Linux Security

Rekoobe backdoor

Cybersecurity researchers have revealed details of a malicious Go module designed to harvest passwords, create persistent access via SSH, and distribute a Linux backdoor named Rekoobe.

Go module, github[.]com/xinfeisoft/crypto impersonates the legitimate “golang.org/x/crypto” codebase, but injects malicious code into the remote endpoint that is responsible for leaking secrets entered via the terminal’s password prompt, and retrieves and executes shell scripts in response.

“This activity falls under namespace confusion and spoofing of the legitimate golang.org/x/crypto subrepository (and its GitHub mirror github.com/golang/crypto),” said socket security researcher Kirill Boychenko. “Legitimate projects identify go.googlesource.com/crypto as canonical and treat GitHub as a mirror. Threat actors exploit this distinction to routinely show github.com/xinfeisoft/crypto in their dependency graphs.”

Specifically, the backdoor is placed within the “ssh/terminal/terminal.go” file so that whenever the victim application calls ReadPassword(), a function whose purpose is to read input such as passwords from the terminal, that information is captured for interactive secrets.

The main role of the downloaded script is to act as a Linux stager, add the threat actor’s SSH keys to the ‘/home/ubuntu/.ssh/authorized_keys’ file, set the iptables default policy to ACCEPT to ease firewall restrictions, and retrieve additional payloads from external servers while disguising themselves with an .mp5 extension.

Of the two payloads, one is a helper that tests the internet connection and attempts to communicate with the IP address (‘154.84.63’).[.]Socket noted that the program would likely function as a scout or loader.

The second downloaded payload is believed to be Rekoobe, a known Linux Trojan that has been detected in the wild since at least 2015. This backdoor can receive commands from an attacker-controlled server to download further payloads, steal files, and execute a reverse shell. As of August 2023, Rekoobe was being used by Chinese nation-state groups like APT31.

The package is still listed on pkg.go.dev, but the Go security team has taken steps to block it as malicious.

“This campaign is likely to be repeated because it is low effort and high impact, with a similar module hooking the high bound (ReadPassword), using GitHub Raw as a rotation pointer, and then pivoting to curl | sh staging and Linux payload delivery,” Boychenko said.

“Defenders should anticipate similar supply chain attacks targeting other ‘credential edge’ libraries (SSH helpers, CLI authentication prompts, database connectors), as well as indirect attacks through hosting surfaces that rotate infrastructure without republishing code.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article“I’m not lying. So who are you?”: What happens when a DNA test shows that a woman is not the mother of the child she gave birth to?
Next Article CISA replaces acting administrator after a disappointing year on the job

Related Posts

OpenAI announces GPT-5.4-Cyber ​​with expanded access for security teams

April 15, 2026

New flaw in PHP Composer allows arbitrary command execution – patch released

April 14, 2026

AI-driven Pushpaganda scam exploits Google Discover to spread scareware and ad fraud

April 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI announces GPT-5.4-Cyber ​​with expanded access for security teams

Anthropic’s rise is causing some OpenAI investors to have second thoughts

Someone has put a backdoor into dozens of WordPress plugins used by thousands of websites.

Anthropic co-founder confirms company briefed Trump administration on Mythos

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.