Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Go Module Targets Passwords and Installs Backdoor

Malicious Go Module Targets Passwords and Installs Backdoor

Posted on February 27, 2026 By CWS

Cybersecurity experts have revealed a new threat involving a deceptive Go module designed to steal passwords and establish unauthorized access via SSH, deploying a Linux backdoor known as Rekoobe.

Deceptive Module and Its Operations

The malicious module, found on github[.]com/xinfeisoft/crypto, masquerades as the legitimate “golang.org/x/crypto” repository. It injects harmful code to capture sensitive information entered through terminal password prompts, which is then sent to a remote server. A shell script is executed in response, further facilitating the attack.

Researchers, including Kirill Boychenko from Socket, have identified this activity as a case of namespace confusion. The threat actor exploits the distinction between the official go.googlesource.com/crypto repository and its GitHub mirror to make their malicious repository appear legitimate in dependency graphs.

Backdoor Details and Impact

The Rekoobe backdoor is embedded within “ssh/terminal/terminal.go”. Whenever a victim application uses the ReadPassword() function intended to securely read inputs like passwords, it inadvertently captures and transmits sensitive data.

The downloaded script acts as a Linux stager, inserting an attacker’s SSH key into the “/home/ubuntu/.ssh/authorized_keys” file, modifying iptables to relax firewall settings, and fetching additional payloads disguised with the .mp5 extension. One payload checks internet connectivity and attempts communication with a specific IP over TCP port 443, potentially serving as a recon tool.

Rekoobe and Ongoing Threats

The second payload is identified as Rekoobe, a Linux trojan active since at least 2015. It allows attackers to execute commands from a controlled server, facilitating further payload downloads, file theft, and reverse shell execution. Recently, groups like APT31 have utilized Rekoobe for cyber espionage.

Although the malicious package is still visible on pkg.go.dev, the Go security team has initiated actions to mark it as harmful. This campaign is a classic example of low-effort, high-impact attacks, leveraging lookalike modules to exploit high-value functions such as ReadPassword.

Experts warn of similar supply chain attacks targeting other critical libraries, anticipating increased use of hosting surfaces to rotate infrastructure without code republishing.

The Hacker News Tags:APT31, Cybersecurity, Linux security, malicious Go module, namespace confusion, password theft, Rekoobe backdoor, SSH access, supply chain attacks, threat actor

Post navigation

Previous Post: Go Module Attack: Password Theft and Backdoor Insertion Threat
Next Post: Aeternum Botnet Uses Polygon Blockchain for C&C Resilience

Related Posts

DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware The Hacker News
Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds The Hacker News
CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center The Hacker News
Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets The Hacker News
Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes The Hacker News
Trust Wallet Chrome Extension Hack Drains .5M via Shai-Hulud Supply Chain Attack Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown
  • Dohdoor Malware Targets U.S. Schools and Healthcare
  • Over 900 FreePBX Systems Infected in Web Shell Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown
  • Dohdoor Malware Targets U.S. Schools and Healthcare
  • Over 900 FreePBX Systems Infected in Web Shell Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News