Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Go Module Typo Exposes DNS Backdoor Hack

Go Module Typo Exposes DNS Backdoor Hack

Posted on May 20, 2026 By CWS

A recent discovery has shown that a minor typo in a Go module name has been silently providing a backdoor for attackers for almost three years. Security experts have uncovered a malicious package dubbed github.com/shopsprint/decimal, which closely mimics the legitimate github.com/shopspring/decimal library, differing only by a single letter.

Subtlety of the Attack

First introduced in 2017, the package was weaponized in August 2023. At this time, attackers embedded a covert command-and-control channel via DNS records into the module. This attack primarily targets Go developers involved in financial software, billing systems, cryptocurrency platforms, and analytics tools.

The genuine shopspring/decimal library is crucial for precise arithmetic operations without rounding errors. The malicious variant mirrors the real one so closely that projects using it experience no visible errors or unusual behavior, allowing it to go unnoticed.

Technical Investigation and Findings

Socket.dev researchers, in collaboration with Cyber Security News (CSN), identified the rogue module and traced its weaponization to August 19, 2023—just seven minutes after a legitimate update. This timing creates the illusion of normal software maintenance. Previous versions of the module were harmless, a tactic aimed at establishing trust before launching the attack.

One of the most significant concerns is that the malicious version remains accessible even after the original GitHub account was deleted. This is due to Go’s reproducibility guarantee, which ensures that all published module versions are cached permanently at proxy.golang.org, making the backdoor perpetually available.

Mechanics of the DNS-Based Backdoor

The backdoor activates when a Go binary importing the compromised package runs. It uses an init() function to start a background loop that contacts a DNS subdomain every five minutes, requesting a TXT record. These records are used to deliver system commands directly to infected machines.

The command server, dnslog-cdn-images[.]freemyip[.]com, is hosted on a dynamic DNS provider under the attacker’s control. Commands are executed silently, leaving no trace, as DNS traffic typically does not trigger standard security alerts.

Protective Measures and Recommendations

Developers and CI systems that have utilized version v1.3.3 should assume their systems are compromised. Immediate actions include rotating credentials such as Git tokens, cloud keys, and SSH keys, auditing Go module files to replace the typosquatted package, and monitoring DNS traffic for suspicious queries.

Indicators of compromise, such as specific hashes and domain names, have been identified to aid in the detection of this threat. Developers are advised to remain vigilant and ensure their software supply chains are secure from such subtle yet impactful attacks.

Cyber Security News Tags:C2 channel, Cybersecurity, Developers, DNS backdoor, Go module, Malware, open source software, security threat, Socket.dev, typosquatting

Post navigation

Previous Post: Enhancing AI Security: Proactive Strategies for Enterprises
Next Post: Webworm Uses Discord and MS Graph for New Backdoors

Related Posts

New tool to Remove Copilot, Recall and Other AI tools From Windows 11 New tool to Remove Copilot, Recall and Other AI tools From Windows 11 Cyber Security News
Hackers Replace ‘m’ with ‘rn’ in Microsoft(.)com to Steal Users’ Login Credentials Hackers Replace ‘m’ with ‘rn’ in Microsoft(.)com to Steal Users’ Login Credentials Cyber Security News
AzureHound Penetration Testing Tool Exploited by Threat Actors to Enumerate Azure and Entra ID AzureHound Penetration Testing Tool Exploited by Threat Actors to Enumerate Azure and Entra ID Cyber Security News
Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication and Upload Malicious Files Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication and Upload Malicious Files Cyber Security News
Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions Cyber Security News
Cornwell Quality Tools Data Breach Cornwell Quality Tools Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 1Password and OpenAI Enhance Security for AI Coding Tools
  • Webworm Uses Discord and MS Graph for New Backdoors
  • Go Module Typo Exposes DNS Backdoor Hack
  • Enhancing AI Security: Proactive Strategies for Enterprises
  • Critical NGINX Flaw Risks Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 1Password and OpenAI Enhance Security for AI Coding Tools
  • Webworm Uses Discord and MS Graph for New Backdoors
  • Go Module Typo Exposes DNS Backdoor Hack
  • Enhancing AI Security: Proactive Strategies for Enterprises
  • Critical NGINX Flaw Risks Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark