Malicious Go “crypto” Module Steals Passwords and Deploys Re...

This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).

Socket's Threat Research Team discovered a malicious Go module, github.com/xinfeisoft/crypto, impersonating the legitimate golang.org/x/crypto package. The backdoor was inserted into ssh/terminal/terminal.go's ReadPassword function, which captures passwords, exfiltrates them to attacker-controlled infrastructure, and executes a remote shell stager. The stager adds an SSH key for persistence, weakens iptables firewall rules, and downloads two disguised payloads — one of which is confirmed as the Rekoobe Linux backdoor linked to APT31. The module used GitHub Raw as a rotating C2 pointer to avoid republishing. The Go module proxy now blocks the package with a 403 SECURITY ERROR after Socket's report. Defenders are advised to treat go.mod changes as security-sensitive, use dependency scanning in CI, and watch for curl|sh execution, authorized_keys modifications, and iptables policy changes.

11m read timeFrom socket.dev
Post cover image
Table of contents
Malicious Module: A Backdoored Clone #The Threat Actor #Linux Stager and Backdoor Delivery Chain #Stage Payloads and Rekoobe Backdoor #Outlook and Recommendations #Indicators of Compromise (IOCs) #MITRE ATT&CK #
2 Comments

Sort: