Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram

Posted on August 22, 2025August 22, 2025 By CWS

A complicated provide chain assault has emerged focusing on builders by means of a malicious Go module package deal that masquerades as a authentic SSH brute forcing software whereas covertly stealing credentials for cybercriminal operations.

The package deal, named “golang-random-ip-ssh-bruteforce,” presents itself as a quick SSH brute forcer however incorporates hidden performance that exfiltrates profitable login credentials to a Telegram bot managed by menace actors.

The malicious package deal operates by repeatedly scanning random IPv4 addresses for uncovered SSH companies on TCP port 22, trying authentication utilizing an embedded username-password wordlist, and instantly transmitting any profitable credentials to its operators.

What makes this assault significantly insidious is that victims consider they’re conducting authentic penetration testing or safety analysis, whereas unknowingly feeding their discoveries on to cybercriminals.

Socket.dev analysts recognized the malicious habits embedded inside the seemingly authentic safety software, revealing that the package deal has been energetic since June 24, 2022.

The researchers found that upon the primary profitable SSH login, the package deal robotically sends the goal IP deal with, username, and password to a hardcoded Telegram bot endpoint managed by a Russian-speaking menace actor often called “IllDieAnyway” on GitHub.

Telegram Bot and person information (Supply – Socket.dev)

The assault vector exploits the belief relationship between builders and open-source packages, representing a rising development of malicious actors distributing offensive safety instruments with backdoor performance.

Customers who obtain and execute the package deal inadvertently develop into unwitting members in a bigger credential harvesting operation, with their profitable penetration makes an attempt being redirected to prison networks somewhat than serving their meant safety evaluation functions.

Technical Implementation and Evasion Mechanisms

The malware’s technical implementation demonstrates subtle evasion techniques designed to keep up operational safety whereas maximizing credential assortment.

The package deal features a intentionally minimal wordlist containing solely widespread default credentials comparable to “root:toor,” “admin:password,” and IoT-specific combos like “root:raspberry” and “root:dietpi,” which reduces community noise and quickens the scanning course of whereas sustaining believable deniability for its operators.

The core malicious performance facilities round a hardcoded Telegram API endpoint:

When profitable authentication happens, the package deal executes an HTTP GET request to this endpoint, transmitting the compromised credentials within the format “ip:username:password” to talk ID 1159678884, related to the Telegram person @io_ping.

The malware intentionally configures SSH connections with HostKeyCallback: ssh.InsecureIgnoreHostKey() to bypass server verification and allow speedy credential testing throughout numerous targets.

Socket’s AI scanner detected a malicious package deal golang-random-ip-ssh-bruteforce (Supply – Socket.dev)

Right here it’s the Socket AI Scanner’s detection of the embedded wordlist file (wl.txt) inside the malicious package deal, highlighting the focused credential combos designed to compromise IoT gadgets, single-board computer systems, and rapidly configured Linux programs.

Increase your SOC and assist your group defend your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Brute, Exfiltrates, Fast, Forcer, Malicious, Module, Package, Passwords, SSH, Telegram

Post navigation

Previous Post: South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members
Next Post: Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day

Related Posts

UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device Cyber Security News
North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups Cyber Security News
North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands Cyber Security News
Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Cyber Security News
TA829 Hackers Employs New TTPs and Upgraded RomCom Backdoor to Evade Detections Cyber Security News
CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Understand GDPR and Data Rights
  • Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
  • 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild
  • PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)
  • How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Understand GDPR and Data Rights
  • Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks
  • 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild
  • PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)
  • How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News