Threat Database Malware Malicious Go Modules Spread Disk-Wiping Linux Malware

Malicious Go Modules Spread Disk-Wiping Linux Malware

Cybersecurity researchers have recently uncovered three harmful Go modules that utilize obfuscated code to fetch unsafe payloads, which can irreversibly damage Linux systems. These modules appear to be legitimate but are designed to execute remote payloads that wipe a system's primary disk, rendering it unbootable.

Identified Unsafe Go Packages

The following Go modules are implicated:

github[.]com/truthfulpharm/prototransform

github[.]com/blankloggia/go-mcp

github[.]com/steelpoor/tlsproxy

These packages contain highly obfuscated code, which is engineered to download and execute payloads when run on a Linux system.

Destructive Payloads Overwrite Critical Disk Data

The damaged code checks for a Linux operating system and, if detected, uses wget to fetch a next-stage payload from a remote server. This payload is a destructive shell script that overwrites the system's primary disk (/dev/sda) with zeroes. As a result, the system becomes unbootable, and no data recovery tools or forensic processes can restore the lost information, as the disk is irreversibly destroyed. This method highlights the extreme risks posed by supply-chain attacks, where legitimate code can cause catastrophic damage to Linux servers and developer environments.

Growing Threat from Fraudulent npm Packages

Alongside the discovery of unsafe Go modules, multiple harmful npm packages have also been detected. These packages are designed to harvest sensitive information, which may include mnemonic seed phrases and private cryptocurrency keys, which can lead to the theft of users' digital assets.

Suspicious npm Packages Identified

The following npm packages have been flagged as tampered:

  • crypto-encrypt-ts
  • react-native-scrollpageviewtest
  • bankingbundleserv
  • buttonfactoryserv-paypal
  • tommyboytesting
  • compliancereadserv-paypal
  • oauth2-paypal
  • paymentapiplatformservice-paypal
  • userbridge-paypal
  • Userrelationship-paypal

These packages are viciously crafted to exfiltrate sensitive information, posing a massive threat to users' privacy and security.

Malware-Laden PyPI Packages Harvest Cryptocurrency Data

The Python Package Index (PyPI) repository has also seen the rise of compromised packages targeting cryptocurrency wallets. These packages have been downloaded over 6,800 times since their release in 2024 and are designed to steal mnemonic seed phrases, compromising users' cryptocurrency holdings.

Notable Unsafe PyPI Packages

Two key packages targeting cryptocurrency wallets include:

  • web3x
  • herewalletbot

These packages aim to siphon mnemonic seed phrases from users, jeopardizing their digital assets. Additionally, another set of seven PyPI packages, which have now been removed, was discovered using Gmail's SMTP servers and WebSockets to exfiltrate data and establish remote access.

Gmail-Based Data Exfiltration and Remote Command Execution

The unsafe PyPI packages use hard-coded Gmail credentials to sign in to Gmail's SMTP server and send a message to another Gmail address to indicate a successful compromise. After this, a WebSocket connection is established, allowing the attacker to maintain bidirectional communication with the compromised system.

The use of Gmail domains (smtp.gmail.com) makes these attacks more stealthy, as corporate proxies and endpoint protection systems are less likely to flag them as suspicious, given the trust associated with Gmail services.

Standout Package: cfc-bsb

The package cfc-bsb is noteworthy as it does not feature Gmail functionality but instead uses WebSocket logic to facilitate remote access, bypassing traditional detection measures.

How to Mitigate Supply Chain Threats

To protect against these harmful packages and other supply chain threats, developers should adopt the following practices:

  • Verify Package Authenticity: Check the publisher's history and GitHub repository links to ensure the package's legitimacy.
  • Audit Dependencies Regularly: Routinely audit dependencies and ensure that they are up-to-date and free from malicious code.
  • Enforce Strict Access Controls: Implement strict access control mechanisms to protect private keys and other sensitive credentials.

Additionally, developers should remain vigilant for unusual outbound connections, particularly SMTP traffic, as attackers may use legitimate services like Gmail for data exfiltration. It is also crucial to avoid trusting a package solely because it has existed for a long time without being removed, as this could mask unsafe activity.

Trending

Most Viewed

Loading...