Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

Posted on May 3, 2025May 10, 2025 By CWS

Might 03, 2025Ravie LakshmananSupply Chain Assault / Malware
Cybersecurity researchers have found three malicious Go modules that embody obfuscated code to fetch next-stage payloads that may irrevocably overwrite a Linux system’s main disk and render it unbootable.
The names of the packages are listed under –

github[.]com/truthfulpharm/prototransform
github[.]com/blankloggia/go-mcp
github[.]com/steelpoor/tlsproxy

“Regardless of showing official, these modules contained extremely obfuscated code designed to fetch and execute distant payloads,” Socket researcher Kush Pandya mentioned.
The packages are designed to examine if the working system on which they’re being run is Linux, and if that’s the case retrieve a next-stage payload from a distant server utilizing wget.
The payload is a damaging shell script that overwrites all the main disk (“/dev/sda”) with zeroes, successfully stopping the machine from booting up.
“This damaging methodology ensures no knowledge restoration instrument or forensic course of can restore the info, because it straight and irreversibly overwrites it,” Pandya mentioned.

“This malicious script leaves focused Linux servers or developer environments fully crippled, highlighting the acute hazard posed by fashionable supply-chain assaults that may flip seemingly trusted code into devastating threats.”
The disclosure comes as a number of malicious npm packages have been recognized within the registry with options to steal mnemonic seed phrases and personal cryptocurrency keys and exfiltrate delicate knowledge. The listing of the packages, recognized by Socket, Sonatype, and Fortinet is under –

crypto-encrypt-ts
react-native-scrollpageviewtest
bankingbundleserv
buttonfactoryserv-paypal
tommyboytesting
compliancereadserv-paypal
oauth2-paypal
paymentapiplatformservice-paypal
userbridge-paypal
userrelationship-paypal

Malware-laced packages focusing on cryptocurrency wallets have additionally been found within the Python Bundle Index (PyPI) repository – web3x and herewalletbot – with capabilities to siphon mnemonic seed phrases. These packages have been collectively downloaded greater than 6,800 occasions since getting revealed in 2024.
One other set of seven PyPI packages have been discovered leveraging Gmail’s SMTP servers and WebSockets for knowledge exfiltration and distant command execution in an try to evade detection. The packages, which have since been eliminated, are as follows –

cfc-bsb (2,913 downloads)
coffin2022 (6,571 downloads)
coffin-codes-2022 (18,126 downloads)
coffin-codes-net (6,144 downloads)
coffin-codes-net2 (6,238 downloads)
coffin-codes-pro (9,012 downloads)
coffin-grave (6,544 downloads)

The packages use hard-coded Gmail account credentials to sign-in to the service’s SMTP server and ship a message to a different Gmail handle to sign a profitable compromise. They subsequently set up a WebSocket connection to ascertain a bidirectional communication channel with the attacker.

The risk actors reap the benefits of the belief related to Gmail domains (“smtp.gmail[.]com”) and the truth that company proxies and endpoint safety techniques are unlikely to flag it as suspicious, making it each stealthy and dependable.
The package deal that aside from the remaining is cfc-bsb, which lacks the Gmail-related performance, however incorporates the WebSocket logic to facilitate distant entry.
To mitigate the chance posed by such provide chain threats, builders are suggested to confirm package deal authenticity by checking writer historical past and GitHub repository hyperlinks; audit dependencies repeatedly; and implement strict entry controls on non-public keys.
“Look ahead to uncommon outbound connections, particularly SMTP visitors, since attackers can use official providers like Gmail to steal delicate knowledge,” Socket researcher Olivia Brown mentioned. “Don’t belief a package deal solely as a result of it has existed for various years with out being taken down.”

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Advanced, Attack, Chain, Deliver, DiskWiping, Linux, Malicious, Malware, Modules, Supply

Post navigation

Previous Post: Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware
Next Post: Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data

Related Posts

Microsoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing Microsoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing The Hacker News
SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers The Hacker News
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps The Hacker News
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations The Hacker News
TA446 Uses DarkSword Exploit in Spear-Phishing Campaign TA446 Uses DarkSword Exploit in Spear-Phishing Campaign The Hacker News
Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark