GoBruteforcer Botnet Targets Crypto Projects with Bruteforce

GoBruteforcer targets crypto/blockchain servers—exploits weak defaults and AI-generated examples to brute-force databases and hunt TRON wallets.

  • GoBruteforcer operators are targeting crypto and blockchain project servers to add them to a botnet that brute-forces FTP, MySQL, PostgreSQL, and phpMyAdmin logins.
  • Campaigns exploit weak defaults and reused AI-generated deployment examples, plus exposed stacks like XAMPP, to gain initial access.
  • Compromised hosts run brute-force scans, serve payloads, and act as IRC-style control points; some probes search Tron addresses for non-zero balances.
  • Separate scanning activity has systematically probed misconfigured LLM endpoints, according to GreyNoise.

What: A new wave of attacks by GoBruteforcer targets database services on Linux servers to add them to a brute-force botnet.
Who: The activity was detailed by Check Point Research.
When/Where: Observations span mid-2025 through early 2026 on internet-exposed hosts.
Why: Operators exploit weak credentials and common defaults to harvest access and search for cryptocurrency funds.

- Advertisement -

Researchers trace the tool back to an initial report in 2023 and note the Malware evolved into a more obfuscated, cross-platform Golang IRC bot with improved persistence. The campaign uses a rotating list of usernames and reused weak passwords that often appear in tutorials and vendor examples, a feedstock amplified by AI-generated deployment snippets, according to Check Point Research.

Attackers frequently use exposed FTP on XAMPP servers as an entry point to upload a PHP web shell. The shell fetches an updated IRC bot tailored to the host architecture. Infected systems then (1) run brute-force modules against FTP, MySQL, Postgres, and phpMyAdmin, (2) host payloads for further compromise, and (3) operate as backup command-and-control nodes.

One staged module iterates TRON addresses via tronscanapi[.]com to find accounts with funds, indicating a focus on blockchain projects. GreyNoise separately reported methodical scans seeking misconfigured proxy servers that could expose commercial LLM APIs, including probes of providers such as OpenAI, Anthropic, and others.

“GoBruteforcer exemplifies a broader and persistent problem: The combination of exposed infrastructure, weak credentials, and increasingly automated tools,” researchers noted.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Buterin: Ethereum Block Times Could Drop To 2 Seconds

Ethereum co-founder Vitalik Buterin has elaborated on a bold new roadmap aiming to dramatically...

How Wall Street Bitcoin ETFs Weaken Spot Price Link

Bitcoin ETF share creation/redemption by authorized participants does not require immediate Bitcoin purchases or...

Nvidia AI Segment Eyed for $50B by 2030

Analyst Gene Munster estimates 70% of NVIDIA’s revenue currently comes from just eight major...

Bitcoin Demand Surges As Price Nears One-Year Low

Global Google searches for "buy Bitcoin" have hit a five-year peak, a historic signal...

AI models escalate to nukes in 95% of war games

AI models from OpenAI, Anthropic, and Google deployed nuclear weapons in 95% of war-game...

Must Read

5 Best Hacking eBooks for Beginners

In this article we present the 5 Best Hacking eBooks for beginners as ranked by our editorial teamWelcome to the world of hacking, where...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!