Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Meta Earth Network 2.0: Pioneering Web3 Innovation with Rewards and Global Events

The more sustainability and transparency you get, the better your decisions will be

Successful In-house SOC 6 steps up to 24 hours a day, 365 days a year

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Malicious GO Module delivers Linux malware that paints disks with advanced supply chain attacks
Identity

Malicious GO Module delivers Linux malware that paints disks with advanced supply chain attacks

userBy userMay 3, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 3, 2025Ravi LakshmananSupply Chain Attacks/Malware

Cybersecurity researchers have discovered three malicious GO modules containing obfuscated code to obtain the next stepped payload that can irreparably overwrite the primary disk of a Linux system and make it untuneable.

The names of the packages are listed below –

github[.]com/truthfulpharm/prototransform github[.]com/blankloggia/go-mcp github[.]com/Steelpoor/tlsproxy

“Even though it looked legal, these modules contained highly obfuscated code designed to retrieve and run remote payloads,” said Socket researcher Kush Pandya.

The packages are designed to check if the operating system they are running on is Linux, and in that case they use WGET to retrieve the next stage payload from the remote server.

The payload is a destructive shell script that overwrites the entire primary disk (“/dev/sda”) with zeros, effectively preventing the machine from starting.

“This destructive method ensures that data recovery tools and forensic processes cannot recover data, as this is directly and irreversibly overwrites,” Pandya said.

Cybersecurity

“This malicious script highlights the extreme dangers posed by modern supply chain attacks that can completely cripple targeted Linux servers or developer environments and turn seemingly reliable code into a catastrophic threat.”

This disclosure includes mnemonic seed phrases and private cryptocurrency keys, as multiple malicious NPM packages have been identified in the registry, and the ability to steal data that is sensitive to exfiltrate. Here is a list of packages identified by Socket, Sonatype, and Fortinet –

crypto-encrypt-ts react-native-scrollpageviewtest Bankingbundleserv buttonfactoryserv-paypal compliancereadsereadserserpal-paypal payapal payapal payanpaypal userbridge-paypal userrelationship-paypal-paypal

Malware-covered packages targeting cryptocurrency wallets have also been discovered in the Python Package Index (PYPI) repository (Web3x and hereWalletbot). These packages have been collectively referred to over 6,800 times since their release in 2024.

We found that another set of seven PYPI packages utilize Gmail’s SMTP server and WebSocket for data removal and remote command execution to avoid detection. The deleted packages are: –

CFC-BSB (2,913 downloads) coffin2022 (6,571 downloads) coffin-codes-2022 (18,126 downloads) coffin-codes-net (6,144 downloads) coffin-codes-net2 (6,238 downloads) coffin-codes-pro (9,012 downloads) coffin-grave (6,544)

The package signs in to the service’s SMTP server using hardcoded Gmail account credentials and sends a message to another Gmail address to indicate successful compromise. It then establishes a WebSocket connection to establish a two-way communication channel with the attacker.

Cybersecurity

Threat actors are using trust related to Gmail domains (“smtp.gmail[.]com “) and the fact that corporate proxy and endpoint protection systems are unlikely to flag them as suspicious, making it stealth and reliable.

Apart from the rest, CFC-BSB, which does not have Gmail-related features but has built-in WebSocket logic that makes remote access easier, is CFC-BSB.

To mitigate the risk poses from such supply chain threats, developers are encouraged to verify the reliability of their packages by checking publisher history and GitHub repository links. Periodically audit dependencies. Enforce strict access control for private keys.

“Beware of extraordinary outbound connections, especially SMTP traffic, as attackers can use legitimate services like Gmail to steal sensitive data,” said Olivia Brown, a Socket researcher. “Don’t trust the package just because it has been around for more than a few years without knocking it down.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy does measles spread in Canada, Mexico and the United States? |Health News
Next Article Gabon swears as former military secretary president Election news
user
  • Website

Related Posts

Successful In-house SOC 6 steps up to 24 hours a day, 365 days a year

June 20, 2025

A massive 7.3 TBPS DDOS attack targets hosting providers and delivers 37.4 TB in 45 seconds

June 20, 2025

Troilerization Github repository found in a campaign targeting 67 gamers and developers

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Meta Earth Network 2.0: Pioneering Web3 Innovation with Rewards and Global Events

The more sustainability and transparency you get, the better your decisions will be

Successful In-house SOC 6 steps up to 24 hours a day, 365 days a year

A massive 7.3 TBPS DDOS attack targets hosting providers and delivers 37.4 TB in 45 seconds

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta Earth Network 2.0: Pioneering Web3 Innovation with Rewards and Global Events

Top 10 Startups and High-Tech Funding News – June 19, 2025

Sifflet raises $18 million to power AI using reliable data as a demand for observability

Is WhatsApp becoming a weapon of war?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.