Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Socgholish malware spreads through AD tools. Provides access to Lockbit, Evil Corp and more

Data breaches at French telecom giant Bouigs impact millions of customers

Malicious GO, NPM package provides cross-platform malware and triggers remote data wipes

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious GO, NPM package provides cross-platform malware and triggers remote data wipes
Identity

Malicious GO, NPM package provides cross-platform malware and triggers remote data wipes

userBy userAugust 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 7, 2025Ravi LakshmananMalware/Threat Intelligence

Cybersecurity researchers have discovered a set of 11 malicious GO packages designed to download additional payloads from remote servers and run them on both Windows and Linux systems.

“At runtime, the code quietly generates a shell, pulls two-stage payloads from the exchangeable set of .icu and .tech command-and-control (C2) endpoints and runs them in memory.”

The list of identified packages is as follows:

github.com/stripedconsu/linker github.com/agitatedleopa/stm github.com/expertsandba/opt github.com/wetteepee/hcloud-ip-floater github.com/weightycine/replika github.com/ordinarymea/tnsr_ids github.com/ordinarymea/tnsr_ids github.com/cavernouskina/mcp-go github.com/lastnymph/gouid github.com/sinfulsky/gouid github.com/briefinitia/gouid

The package hides the functional obfuscated loader and retrieves the second stage ELF and portable executable (PE) binaries. This will collect host information, access web browser data, and send Beacon to the C2 server.

Cybersecurity

“The second stage payload provides a payload with a bash script for Linux systems and retrieves the Windows executable through Certutil.exe, making it easy for both Linux build servers and Windows workstations to compromise,” Brown said.

What complicates the problem is the distributed nature of the GO ecosystem, allowing modules to be imported directly from the GitHub repository, and searching for packages in Pkg.go.go.dev can cause confusion for key developers.

“Attackers exploit the confusion and carefully create namespaces for malicious modules to make them seem trustworthy at a glance, significantly increasing the chances of potential developers inadvertently integrating destructive code into their projects,” says Socket.

The package is rated as a single threat actor’s work in C2 reuse and code form. The findings highlight the continued supply chain risks that arise from the cross-platform nature of Go To Push malware.

This development coincides with the discovery of two NPM packages, Naya-Flore and Nvlore-HSC. It incorporates a phone number-based kill switch that allows developers to wipe remotely wipe their systems.

Packages that are collectively downloaded through 1,110 downloads are still available in the NPM Registry at the time of writing. Both libraries were published in early July 2025 by a user named “Nayflore.”

The core of their operations is their ability to retrieve remote databases of Indonesian phone numbers from GitHub repository. Once the package is run, it first checks if the current phone is in the database, and if not, then recursively deletes all files using the command “RM -RF *” following the WhatsApp pairing process.

We also know that the package contains functions that extend device information to external endpoints, but calls to the function have been commented out, suggesting that the threat actor behind the scheme is signaling ongoing development.

“Naya-Flore also includes a hardcoding Github personal access token that provides unauthorized access to private repositories,” said security researcher Kush Pandya. “The purpose of this token remains unknown from the available code.”

Identity Security Risk Assessment

“The presence of unused Github tokens may indicate incomplete development, planned features, or use in other parts of the codebase that are not included in these packages.”

Open source repositories continue to be an attractive malware delivery channel in the software supply chain, designed to steal sensitive information and, in some cases, target cryptocurrency wallets.

“While the overall tactics have not evolved much, attackers continue to rely on proven techniques, such as minimizing file counts, using installation scripts, and using modest data stripping methods to maximize impact,” says Fortinet Fortiguard Labs.

“The continuous increase in obfuscation also further points to the importance of vigilance and continuous monitoring required by users of these services, and as OSS continues to grow, so is the attack surface due to supply chain threats.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTrump says Intel CEO Lipbu Tang “I have to resign soon.”
Next Article Data breaches at French telecom giant Bouigs impact millions of customers
user
  • Website

Related Posts

Socgholish malware spreads through AD tools. Provides access to Lockbit, Evil Corp and more

August 7, 2025

Microsoft discloses defects in Exchange Server that allow silent cloud access in hybrid setups

August 7, 2025

The 6,500 axis server exposes the remote protocol. 4,000 people in the US are vulnerable to exploitation

August 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Socgholish malware spreads through AD tools. Provides access to Lockbit, Evil Corp and more

Data breaches at French telecom giant Bouigs impact millions of customers

Malicious GO, NPM package provides cross-platform malware and triggers remote data wipes

Trump says Intel CEO Lipbu Tang “I have to resign soon.”

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Google’s Genie 3: The Dawn of General AI?

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.