Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GoBruteforcer Botnet Targeting Crypto, Blockchain Projects

GoBruteforcer Botnet Targeting Crypto, Blockchain Projects

Posted on January 13, 2026January 13, 2026 By CWS

An developed GoBruteforcer botnet variant has been concentrating on cryptocurrency and blockchain tasks in a financially motivated marketing campaign, Examine Level experiences.

First detailed in 2023, GoBruteforcer targets Linux servers to ensnare them right into a scanning and password brute-forcing botnet that focuses on internet-exposed companies, together with FTP, MySQL, phpMyAdmin, and PostgreSQL.

In keeping with Examine Level, there are tens of hundreds of web-accessible panels and databases utilizing credentials which have been leaked on-line, and that are prone to GoBruteforcer compromise.

Written in Go, the malware consists of an IRC bot that gives operators with management over the contaminated methods, and a brute-forcer that scans random public IP ranges and makes an attempt propagation utilizing generally used credentials.

Additionally contributing to GoBruteforcer’s propagation, Examine Level says, are the usage of weak usernames and passwords in contemporary deployments powered by AI, and the persistence of legacy internet server software program stacks.

The cybersecurity agency’s testing confirmed that completely different LLMs might use related, common default usernames for pattern server deployments that might find yourself in manufacturing with out correct sanitization.Commercial. Scroll to proceed studying.

“Though we don’t assume that GoBruteforcer particularly targets AI-assisted server installations, the widespread use of LLMs might assist the botnet’s assaults grow to be extra profitable,” Examine Level notes.

One other necessary issue within the botnet’s success is the continued use of internet stacks similar to XAMPP, which regularly include default credentials that act as a backdoor, the cybersecurity agency says.

The botnet’s command-and-control (C&C) server sends directions concerning the online companies to be focused, together with a listing of credentials for brute-forcing. The record is rotated a number of occasions per week.

Examine Level noticed an internet-exposed FTP service on servers working XAMPP being a notable vector for preliminary compromise in these assaults.

The an infection chain continues with the set up of an online shell that gives operators with management over the contaminated system. The net shell is used to fetch and execute extra payloads, together with the IRC bot that additionally offers host management.

Examine Level additionally found that GoBruteforcer has been utilizing crypto-themed usernames in assaults, and likewise found bot modules that particularly iterate TRON blockchain addresses and question balances to determine potential targets of curiosity.

The botnet operators additionally deployed utilities that enable them to switch Binance Good Chain (BSC) and TRON tokens from their victims to attacker-controlled wallets. Two blockchain pockets addresses recovered by Examine Level doubtless belonged to a legacy blockchain product.

“GoBruteforcer exemplifies a broader and protracted drawback: the mix of uncovered infrastructure, weak credentials, and more and more automated instruments. Whereas the botnet itself is technically easy, its operators profit from the huge variety of misconfigured companies that stay on-line,” Examine Level notes.

Associated: Kimwolf Android Botnet Grows By way of Residential Proxy Networks

Associated: RondoDox Botnet Exploiting React2Shell Vulnerability

Associated: New ‘Broadside’ Botnet Poses Danger to Delivery Firms

Associated: Uncovered Docker APIs Probably Exploited to Construct Botnet

Security Week News Tags:Blockchain, Botnet, Crypto, GoBruteforcer, Projects, Targeting

Post navigation

Previous Post: After Goldman, JPMorgan Discloses Law Firm Data Breach
Next Post: Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Related Posts

Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Security Week News
Stryker Hit by Major Cyberattack Linked to Iran Stryker Hit by Major Cyberattack Linked to Iran Security Week News
Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield Hijacked Satellites and Orbiting Space Weapons: In the 21st Century, Space Is the New Battlefield Security Week News
175,000 Exposed Ollama Hosts Could Enable LLM Abuse 175,000 Exposed Ollama Hosts Could Enable LLM Abuse Security Week News
European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested Security Week News
White House Proposes 7 Million CISA Budget Cut White House Proposes $707 Million CISA Budget Cut Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark