Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

GoBruteforcer Botnet Targeting Crypto, Blockchain Projects

Posted on January 13, 2026January 13, 2026 By CWS

An developed GoBruteforcer botnet variant has been concentrating on cryptocurrency and blockchain tasks in a financially motivated marketing campaign, Examine Level experiences.

First detailed in 2023, GoBruteforcer targets Linux servers to ensnare them right into a scanning and password brute-forcing botnet that focuses on internet-exposed companies, together with FTP, MySQL, phpMyAdmin, and PostgreSQL.

In keeping with Examine Level, there are tens of hundreds of web-accessible panels and databases utilizing credentials which have been leaked on-line, and that are prone to GoBruteforcer compromise.

Written in Go, the malware consists of an IRC bot that gives operators with management over the contaminated methods, and a brute-forcer that scans random public IP ranges and makes an attempt propagation utilizing generally used credentials.

Additionally contributing to GoBruteforcer’s propagation, Examine Level says, are the usage of weak usernames and passwords in contemporary deployments powered by AI, and the persistence of legacy internet server software program stacks.

The cybersecurity agency’s testing confirmed that completely different LLMs might use related, common default usernames for pattern server deployments that might find yourself in manufacturing with out correct sanitization.Commercial. Scroll to proceed studying.

“Though we don’t assume that GoBruteforcer particularly targets AI-assisted server installations, the widespread use of LLMs might assist the botnet’s assaults grow to be extra profitable,” Examine Level notes.

One other necessary issue within the botnet’s success is the continued use of internet stacks similar to XAMPP, which regularly include default credentials that act as a backdoor, the cybersecurity agency says.

The botnet’s command-and-control (C&C) server sends directions concerning the online companies to be focused, together with a listing of credentials for brute-forcing. The record is rotated a number of occasions per week.

Examine Level noticed an internet-exposed FTP service on servers working XAMPP being a notable vector for preliminary compromise in these assaults.

The an infection chain continues with the set up of an online shell that gives operators with management over the contaminated system. The net shell is used to fetch and execute extra payloads, together with the IRC bot that additionally offers host management.

Examine Level additionally found that GoBruteforcer has been utilizing crypto-themed usernames in assaults, and likewise found bot modules that particularly iterate TRON blockchain addresses and question balances to determine potential targets of curiosity.

The botnet operators additionally deployed utilities that enable them to switch Binance Good Chain (BSC) and TRON tokens from their victims to attacker-controlled wallets. Two blockchain pockets addresses recovered by Examine Level doubtless belonged to a legacy blockchain product.

“GoBruteforcer exemplifies a broader and protracted drawback: the mix of uncovered infrastructure, weak credentials, and more and more automated instruments. Whereas the botnet itself is technically easy, its operators profit from the huge variety of misconfigured companies that stay on-line,” Examine Level notes.

Associated: Kimwolf Android Botnet Grows By way of Residential Proxy Networks

Associated: RondoDox Botnet Exploiting React2Shell Vulnerability

Associated: New ‘Broadside’ Botnet Poses Danger to Delivery Firms

Associated: Uncovered Docker APIs Probably Exploited to Construct Botnet

Security Week News Tags:Blockchain, Botnet, Crypto, GoBruteforcer, Projects, Targeting

Post navigation

Previous Post: After Goldman, JPMorgan Discloses Law Firm Data Breach
Next Post: Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Related Posts

Asheville Eye Associates Says 147,000 Impacted by Data Breach Security Week News
Extortion Group Leaks Millions of Records From Salesforce Hacks Security Week News
Hackers Access Legacy Systems in Oxford City Council Cyberattack Security Week News
UK Sanctions Russian and Chinese Firms Suspected of Being ‘Malign Actors’ in Information Warfare Security Week News
Fortinet Patches Critical Authentication Bypass Vulnerabilities Security Week News
Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CrowdStrike to Acquire Browser Security Firm Seraphic for $420 Million
  • Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities
  • Microsoft Patch Tuesday January 2026
  • FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests
  • Node.js Security Release Patches 7 Vulnerabilities Across All Release Lines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CrowdStrike to Acquire Browser Security Firm Seraphic for $420 Million
  • Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities
  • Microsoft Patch Tuesday January 2026
  • FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests
  • Node.js Security Release Patches 7 Vulnerabilities Across All Release Lines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark