Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious GO, NPM package provides cross-platform malware and triggers remote data wipes
Identity

Malicious GO, NPM package provides cross-platform malware and triggers remote data wipes

userBy userAugust 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 7, 2025Ravi LakshmananMalware/Threat Intelligence

Cybersecurity researchers have discovered a set of 11 malicious GO packages designed to download additional payloads from remote servers and run them on both Windows and Linux systems.

“At runtime, the code quietly generates a shell, pulls two-stage payloads from the exchangeable set of .icu and .tech command-and-control (C2) endpoints and runs them in memory.”

The list of identified packages is as follows:

github.com/stripedconsu/linker github.com/agitatedleopa/stm github.com/expertsandba/opt github.com/wetteepee/hcloud-ip-floater github.com/weightycine/replika github.com/ordinarymea/tnsr_ids github.com/ordinarymea/tnsr_ids github.com/cavernouskina/mcp-go github.com/lastnymph/gouid github.com/sinfulsky/gouid github.com/briefinitia/gouid

The package hides the functional obfuscated loader and retrieves the second stage ELF and portable executable (PE) binaries. This will collect host information, access web browser data, and send Beacon to the C2 server.

Cybersecurity

“The second stage payload provides a payload with a bash script for Linux systems and retrieves the Windows executable through Certutil.exe, making it easy for both Linux build servers and Windows workstations to compromise,” Brown said.

What complicates the problem is the distributed nature of the GO ecosystem, allowing modules to be imported directly from the GitHub repository, and searching for packages in Pkg.go.go.dev can cause confusion for key developers.

“Attackers exploit the confusion and carefully create namespaces for malicious modules to make them seem trustworthy at a glance, significantly increasing the chances of potential developers inadvertently integrating destructive code into their projects,” says Socket.

The package is rated as a single threat actor’s work in C2 reuse and code form. The findings highlight the continued supply chain risks that arise from the cross-platform nature of Go To Push malware.

This development coincides with the discovery of two NPM packages, Naya-Flore and Nvlore-HSC. It incorporates a phone number-based kill switch that allows developers to wipe remotely wipe their systems.

Packages that are collectively downloaded through 1,110 downloads are still available in the NPM Registry at the time of writing. Both libraries were published in early July 2025 by a user named “Nayflore.”

The core of their operations is their ability to retrieve remote databases of Indonesian phone numbers from GitHub repository. Once the package is run, it first checks if the current phone is in the database, and if not, then recursively deletes all files using the command “RM -RF *” following the WhatsApp pairing process.

We also know that the package contains functions that extend device information to external endpoints, but calls to the function have been commented out, suggesting that the threat actor behind the scheme is signaling ongoing development.

“Naya-Flore also includes a hardcoding Github personal access token that provides unauthorized access to private repositories,” said security researcher Kush Pandya. “The purpose of this token remains unknown from the available code.”

Identity Security Risk Assessment

“The presence of unused Github tokens may indicate incomplete development, planned features, or use in other parts of the codebase that are not included in these packages.”

Open source repositories continue to be an attractive malware delivery channel in the software supply chain, designed to steal sensitive information and, in some cases, target cryptocurrency wallets.

“While the overall tactics have not evolved much, attackers continue to rely on proven techniques, such as minimizing file counts, using installation scripts, and using modest data stripping methods to maximize impact,” says Fortinet Fortiguard Labs.

“The continuous increase in obfuscation also further points to the importance of vigilance and continuous monitoring required by users of these services, and as OSS continues to grow, so is the attack surface due to supply chain threats.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTrump says Intel CEO Lipbu Tang “I have to resign soon.”
Next Article Data breaches at French telecom giant Bouigs impact millions of customers
user
  • Website

Related Posts

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Whitehouse is already one of the most blocked accounts on Bluesky

Europol dismantles SIM farm network running 49 million fake accounts worldwide

Wikipedia says AI search summaries and social videos are causing traffic decline

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.