GoBruteforcer Botnet Targets Crypto Projects with Bruteforce

GoBruteforcer targets crypto/blockchain servers—exploits weak defaults and AI-generated examples to brute-force databases and hunt TRON wallets.

  • GoBruteforcer operators are targeting crypto and blockchain project servers to add them to a botnet that brute-forces FTP, MySQL, PostgreSQL, and phpMyAdmin logins.
  • Campaigns exploit weak defaults and reused AI-generated deployment examples, plus exposed stacks like XAMPP, to gain initial access.
  • Compromised hosts run brute-force scans, serve payloads, and act as IRC-style control points; some probes search Tron addresses for non-zero balances.
  • Separate scanning activity has systematically probed misconfigured LLM endpoints, according to GreyNoise.

What: A new wave of attacks by GoBruteforcer targets database services on Linux servers to add them to a brute-force botnet.
Who: The activity was detailed by Check Point Research.
When/Where: Observations span mid-2025 through early 2026 on internet-exposed hosts.
Why: Operators exploit weak credentials and common defaults to harvest access and search for cryptocurrency funds.

- Advertisement -

Researchers trace the tool back to an initial report in 2023 and note the Malware evolved into a more obfuscated, cross-platform Golang IRC bot with improved persistence. The campaign uses a rotating list of usernames and reused weak passwords that often appear in tutorials and vendor examples, a feedstock amplified by AI-generated deployment snippets, according to Check Point Research.

Attackers frequently use exposed FTP on XAMPP servers as an entry point to upload a PHP web shell. The shell fetches an updated IRC bot tailored to the host architecture. Infected systems then (1) run brute-force modules against FTP, MySQL, Postgres, and phpMyAdmin, (2) host payloads for further compromise, and (3) operate as backup command-and-control nodes.

One staged module iterates TRON addresses via tronscanapi[.]com to find accounts with funds, indicating a focus on blockchain projects. GreyNoise separately reported methodical scans seeking misconfigured proxy servers that could expose commercial LLM APIs, including probes of providers such as OpenAI, Anthropic, and others.

“GoBruteforcer exemplifies a broader and persistent problem: The combination of exposed infrastructure, weak credentials, and increasingly automated tools,” researchers noted.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Cathie Wood: US Bitcoin Purchases Could Ignite Scarcity Now!

Cathie Wood, CEO of Ark Invest, said the U.S. buying Bitcoin could speed up...

Cathie Wood: Gold Surges Bitcoin Weakened – Different Roles

Cathie Wood says the split between Gold and Bitcoin reflects different roles and timing,...

Anthropic ClaudeAI CoWork Enables AI Vibe Audits for Crypto!

Anthropic updated its AI coding tool to give developers full desktop access through the...

Publishers Sue to Block Google Over Pirated Books in AI Case

Hachette Book Group and Cengage Group moved to join a California federal class action...

Radix launches public Hyperscale test targeting 500k TPS now

Radix Foundation announced its 2026 Strategy, shifting toward a fully decentralized ecosystem and ending...
- Advertisement -

Must Read

What Is a Sim Swap Hack?

You've likely heard the term 'sim-swap,' but do you really know what it means? It's a type of fraud that's rapidly increasing, where scammers...
Bitcoin (BTC) $ 95,431.00 1.68%
Ethereum (ETH) $ 3,304.95 2.19%
XRP (XRP) $ 2.06 3.23%
Bittensor (TAO) $ 272.22 5.43%
Polkadot (DOT) $ 2.11 5.35%
Cardano (ADA) $ 0.390122 4.57%
Chainlink (LINK) $ 13.73 3.11%
Hyperliquid (HYPE) $ 25.04 1.90%
Monero (XMR) $ 712.43 2.58%
Hedera (HBAR) $ 0.116492 4.79%
Toncoin (TON) $ 1.71 4.10%