GoBruteforcer Botnet Targets Crypto Projects with Bruteforce

GoBruteforcer targets crypto/blockchain servers—exploits weak defaults and AI-generated examples to brute-force databases and hunt TRON wallets.

  • GoBruteforcer operators are targeting crypto and blockchain project servers to add them to a botnet that brute-forces FTP, MySQL, PostgreSQL, and phpMyAdmin logins.
  • Campaigns exploit weak defaults and reused AI-generated deployment examples, plus exposed stacks like XAMPP, to gain initial access.
  • Compromised hosts run brute-force scans, serve payloads, and act as IRC-style control points; some probes search Tron addresses for non-zero balances.
  • Separate scanning activity has systematically probed misconfigured LLM endpoints, according to GreyNoise.

What: A new wave of attacks by GoBruteforcer targets database services on Linux servers to add them to a brute-force botnet.
Who: The activity was detailed by Check Point Research.
When/Where: Observations span mid-2025 through early 2026 on internet-exposed hosts.
Why: Operators exploit weak credentials and common defaults to harvest access and search for cryptocurrency funds.

- Advertisement -

Researchers trace the tool back to an initial report in 2023 and note the Malware evolved into a more obfuscated, cross-platform Golang IRC bot with improved persistence. The campaign uses a rotating list of usernames and reused weak passwords that often appear in tutorials and vendor examples, a feedstock amplified by AI-generated deployment snippets, according to Check Point Research.

Attackers frequently use exposed FTP on XAMPP servers as an entry point to upload a PHP web shell. The shell fetches an updated IRC bot tailored to the host architecture. Infected systems then (1) run brute-force modules against FTP, MySQL, Postgres, and phpMyAdmin, (2) host payloads for further compromise, and (3) operate as backup command-and-control nodes.

One staged module iterates TRON addresses via tronscanapi[.]com to find accounts with funds, indicating a focus on blockchain projects. GreyNoise separately reported methodical scans seeking misconfigured proxy servers that could expose commercial LLM APIs, including probes of providers such as OpenAI, Anthropic, and others.

“GoBruteforcer exemplifies a broader and persistent problem: The combination of exposed infrastructure, weak credentials, and increasingly automated tools,” researchers noted.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Intel Defies Tech Slump as AI, GPU Plans Fuel Rebound

Intel stock has shown relative resilience, dropping only slightly during a broader tech sell-off.The...

BitMine’s $8B ETH Loss: Tom Lee Says It’s “A Feature”

BitMine Immersion Technologies holds over 4.29 million ETH worth $16.4 billion, approximately 3.5% of...

Alphabet Stock Dips 2.5% Despite Strong Earnings Amid AI Spend Worries

Alphabet (GOOGL) stock fell 2.5% Thursday, extending a five-day slide to 4% despite a...

US Crypto Bill Stalls in Senate Amid Partisan Dispute

A major crypto market structure bill has cleared the Senate Agricultural Committee but faces...

Treasury Chief Blasts ‘Nihilist’ Crypto Lobby on Bill

U.S. Treasury Secretary Scott Bessent criticized crypto industry figures resisting a major market structure...
- Advertisement -

Must Read

26 Best Investment Audiobooks on Audible

Looking to expand your financial knowledge? Me too..When I first started investing, I was completely lost. There were so many terms, strategies, and theories...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!