Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram

Posted on August 22, 2025August 22, 2025 By CWS

A complicated provide chain assault has emerged focusing on builders by means of a malicious Go module package deal that masquerades as a authentic SSH brute forcing software whereas covertly stealing credentials for cybercriminal operations.

The package deal, named “golang-random-ip-ssh-bruteforce,” presents itself as a quick SSH brute forcer however incorporates hidden performance that exfiltrates profitable login credentials to a Telegram bot managed by menace actors.

The malicious package deal operates by repeatedly scanning random IPv4 addresses for uncovered SSH companies on TCP port 22, trying authentication utilizing an embedded username-password wordlist, and instantly transmitting any profitable credentials to its operators.

What makes this assault significantly insidious is that victims consider they’re conducting authentic penetration testing or safety analysis, whereas unknowingly feeding their discoveries on to cybercriminals.

Socket.dev analysts recognized the malicious habits embedded inside the seemingly authentic safety software, revealing that the package deal has been energetic since June 24, 2022.

The researchers found that upon the primary profitable SSH login, the package deal robotically sends the goal IP deal with, username, and password to a hardcoded Telegram bot endpoint managed by a Russian-speaking menace actor often called “IllDieAnyway” on GitHub.

Telegram Bot and person information (Supply – Socket.dev)

The assault vector exploits the belief relationship between builders and open-source packages, representing a rising development of malicious actors distributing offensive safety instruments with backdoor performance.

Customers who obtain and execute the package deal inadvertently develop into unwitting members in a bigger credential harvesting operation, with their profitable penetration makes an attempt being redirected to prison networks somewhat than serving their meant safety evaluation functions.

Technical Implementation and Evasion Mechanisms

The malware’s technical implementation demonstrates subtle evasion techniques designed to keep up operational safety whereas maximizing credential assortment.

The package deal features a intentionally minimal wordlist containing solely widespread default credentials comparable to “root:toor,” “admin:password,” and IoT-specific combos like “root:raspberry” and “root:dietpi,” which reduces community noise and quickens the scanning course of whereas sustaining believable deniability for its operators.

The core malicious performance facilities round a hardcoded Telegram API endpoint:

When profitable authentication happens, the package deal executes an HTTP GET request to this endpoint, transmitting the compromised credentials within the format “ip:username:password” to talk ID 1159678884, related to the Telegram person @io_ping.

The malware intentionally configures SSH connections with HostKeyCallback: ssh.InsecureIgnoreHostKey() to bypass server verification and allow speedy credential testing throughout numerous targets.

Socket’s AI scanner detected a malicious package deal golang-random-ip-ssh-bruteforce (Supply – Socket.dev)

Right here it’s the Socket AI Scanner’s detection of the embedded wordlist file (wl.txt) inside the malicious package deal, highlighting the focused credential combos designed to compromise IoT gadgets, single-board computer systems, and rapidly configured Linux programs.

Increase your SOC and assist your group defend your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Brute, Exfiltrates, Fast, Forcer, Malicious, Module, Package, Passwords, SSH, Telegram

Post navigation

Previous Post: South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members
Next Post: Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day

Related Posts

New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries Cyber Security News
Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset Cyber Security News
Top 50 Best Penetration Testing Companies Cyber Security News
New HTTP Smuggling Attack Technique Let Hackers Inject Malicious Requests Cyber Security News
UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware Cyber Security News
New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark