Malicious Go Module Hijacks Linux Passwords

Malicious Go Module Impersonates Crypto Library to Steal Secrets and Deploy Rekoobe Backdoor

  • A malicious Go module impersonates a legitimate “golang.org/x/crypto” library to steal secrets.
  • The malware harvests passwords, creates SSH backdoor access, and deploys the Linux backdoor Rekoobe.
  • The Rekoobe backdoor, linked to Chinese nation-state groups like APT31, enables downloading more payloads and executing reverse shells.
  • The Go security team has blocked the malicious package, but researchers warn similar low-effort, high-impact attacks are likely to repeat.

Cybersecurity researchers disclosed on February 27, 2026, that a malicious Go module is harvesting terminal passwords and deploying the persistent Rekoobe Linux backdoor. The module, hosted under a deceptive name, infiltrates victim applications by impersonating legitimate code.

- Advertisement -

Specifically, the fake “github[.]com/xinfeisoft/crypto” module injects malicious code into the “ssh/terminal/terminal.go” file. Consequently, when an application uses the ReadPassword() function, secrets are captured and sent to a remote server.

The campaign then downloads a staging script to create persistent SSH access and loosen firewall rules. Meanwhile, additional payloads disguised with a .mp5 extension are retrieved from an external server.

One payload is a connectivity-testing helper program. However, the second is identified as Rekoobe, a known Linux trojan active since at least 2015.

This backdoor is capable of receiving commands to download payloads, steal files, and execute a reverse shell. As recently as August 2023, Rekoobe has been used by Chinese nation-state groups like APT31.

- Advertisement -

Socket security researcher Kirill Boychenko said, “This activity fits namespace confusion and impersonation of the legitimate golang.org/x/crypto subrepository.” The Go security team has now taken steps to block the malicious package listed on pkg.go.dev.

Boychenko warned similar supply chain attacks are likely to repeat because the pattern is low-effort and high-impact. Defenders should anticipate more attacks targeting credential libraries.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Tesla Cybertruck Delivery Wait Hits 2027

Tesla's website shows delivery estimates stretching to 2025 for its new Dual Motor AWD...

Binance’s Compliance Claims Questioned Amid Iran Scrutiny

Binance faces renewed criticism for facilitating transactions linked to Iran, which its leadership calls...

Figure Stock Plummets 20% Despite Strong Revenue Growth

Figure Technology Solutions shares plummeted ~20% despite reporting increased Q4 revenue of $159.9 million...

Block Stock Jumps 18% on Layoffs, AI Shift

Block Inc (XYZ) stock surged up to 18% following CEO Jack Dorsey's announcement of...

South Korea’s Tax Service Leaks Secret Crypto Keys in Blunder

South Korea’s National Tax Service accidentally published seed phrases in a press photo, revealing...

Must Read

9 Best Books On Ethereum And Blockchain Technology

QUICK LINKSHow to Choose Your First Blockchain Book: A Simple Framework1. Define Your Goal: Are you looking to Build, Invest, or Understand?2. Assess Your...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!