Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

BlueSky blocks Mississippi services across age guarantee laws

Former Meta Executive Nick Clegg has been careful to criticize Silicon Valley “Conformist to Croy”

Netflix’s “Kpop Demon Hunters” is probably the biggest movie in theatre

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious GO modules pose as SSH brute force tool and steal credentials via Telegram bot
Identity

Malicious GO modules pose as SSH brute force tool and steal credentials via Telegram bot

userBy userAugust 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 24, 2025Ravi LakshmananMalware/Supply Chain Security

SSH Brute Force Tool

Cybersecurity researchers have discovered a malicious GO module that presents its status as a brute force tool for SSH, but in reality it includes the ability to carefully remove credentials from its creators.

“In the first successful login, the package sends the target IP address, username and password to a hard-coded telegram bot controlled by the threat actor,” said Socket researcher Kirill Boychenko.

The deceptive package named “Golang-Random-IP-Ssh-Bruteforce” is linked to a Github account called Illdieanyway (G3TT) that is currently inaccessible. However, it is still available at Pkg.go[.]Developer. It was released on June 24th, 2022.

The software supply chain security company said the GO module works by scanning random IPv4 addresses of publicly available SSH services on TCP port 22, brute-force the service using a built-in username password list, and removing successful credentials to the attacker.

A notable aspect of malware is that by setting “ssh.insecureignorehostkey” as Hostkeycallback, it intentionally disables host key verification, which allows the SSH client to accept connections from any server, regardless of identity.

WordList is fairly simple, with only two username routes and an admin. It also pairs weak passwords such as root, test, password, administrator, 12345678, 1234, QWERTY, WebAdmin, Webmaster, TechSupport, LetMein, PassW@rd.

Identity Security Risk Assessment

The malicious code runs in an infinite loop to generate an IPv4 address, and the package attempts simultaneous SSH logins from the WordList.

Details will be sent via the API to a threat actor controlled telegram bot named “@sshzxc_bot” (ssh_bot) to allow for the receipt of credentials. The message is sent to the account via the bot using the handle “@io_ping” (gett).

SSH Brute Force Tool

The currently deleted Internet archive snapshots of GitHub accounts show that G3TT’s software portfolio (also known as G3TT’s software portfolio) includes an IP port scanner, Instagram profile information and media parser, as well as a PHP-based command and control (C2) botnet called SELICA-C2.

Their YouTube channel remains accessible and hosts a variety of short form videos that they claim to be “how to hack a Telegram Bot” and “the most powerful SMS bomber in the Russian Federation.” The threat leader is rated as Russian origin.

“This package infers scans and password guesses to unconscious operators, spreads risks across the IPS, and leaks success to a single threat actor-controlled telegram bot,” says Boychenko.

“Disables host key verification, drives high concurrency after the first enabled login, and prioritizes quick capture. As TelegramBotAPI uses HTTPS, traffic looks like a normal web request and can pass through coarse output controls.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAmazon AGI Labs Chief defends his reverse Acquihire
Next Article iPhone 17, “the thinnest iPhone ever” and everything else we expect from Apple’s hardware events
user
  • Website

Related Posts

Push Geoserver Exploits, Polarradege, Gayfemboy Push Cybercrime beyond traditional botnets

August 23, 2025

Linux malware delivered via malicious RAR filenames avoids antivirus detection

August 22, 2025

Automation is redefineing pentest delivery

August 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

BlueSky blocks Mississippi services across age guarantee laws

Former Meta Executive Nick Clegg has been careful to criticize Silicon Valley “Conformist to Croy”

Netflix’s “Kpop Demon Hunters” is probably the biggest movie in theatre

iPhone 17, “the thinnest iPhone ever” and everything else we expect from Apple’s hardware events

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.