BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Malicious Go Module Hijacks Linux Passwords

Malicious Go Module Impersonates Crypto Library to Steal Secrets and Deploy Rekoobe Backdoor

  • A malicious Go module impersonates a legitimate “golang.org/x/crypto” library to steal secrets.
  • The malware harvests passwords, creates SSH backdoor access, and deploys the Linux backdoor Rekoobe.
  • The Rekoobe backdoor, linked to Chinese nation-state groups like APT31, enables downloading more payloads and executing reverse shells.
  • The Go security team has blocked the malicious package, but researchers warn similar low-effort, high-impact attacks are likely to repeat.

Cybersecurity researchers disclosed on February 27, 2026, that a malicious Go module is harvesting terminal passwords and deploying the persistent Rekoobe Linux backdoor. The module, hosted under a deceptive name, infiltrates victim applications by impersonating legitimate code.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

Specifically, the fake “github[.]com/xinfeisoft/crypto” module injects malicious code into the “ssh/terminal/terminal.go” file. Consequently, when an application uses the ReadPassword() function, secrets are captured and sent to a remote server.

The campaign then downloads a staging script to create persistent SSH access and loosen firewall rules. Meanwhile, additional payloads disguised with a .mp5 extension are retrieved from an external server.

One payload is a connectivity-testing helper program. However, the second is identified as Rekoobe, a known Linux trojan active since at least 2015.

This backdoor is capable of receiving commands to download payloads, steal files, and execute a reverse shell. As recently as August 2023, Rekoobe has been used by Chinese nation-state groups like APT31.

- Advertisement -

Socket security researcher Kirill Boychenko said, “This activity fits namespace confusion and impersonation of the legitimate golang.org/x/crypto subrepository.” The Go security team has now taken steps to block the malicious package listed on pkg.go.dev.

Boychenko warned similar supply chain attacks are likely to repeat because the pattern is low-effort and high-impact. Defenders should anticipate more attacks targeting credential libraries.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

White House, Lawmakers Reach Tentative Deal on Stablecoin Yield

A tentative deal has been struck between the White House and key senators on...

US Senators, White House Reach Crypto Stablecoin Deal

A bipartisan group of senators, including Thom Tillis and Angela Alsobrooks, has reached a...

Traders Pile Into Bearish Bets Despite Bitcoin Calm

Bitcoin volatility has dropped, but traders are still paying significant premiums for downside protection,...

Super Micro Appoints CCO After Indictment

Super Micro Computer board member Yih-Shyan "Wally" Liaw resigned after being named in a...

Crypto Firms Slash Staff Amid Bear Market & AI Pivot

Major cryptocurrency firms are conducting significant workforce reductions amid a bear market and global...

Must Read

Best Metaverse Tokens to Buy on Binance for 10X Gains

Ever since Facebook renamed their company to Meta, as well as their plans to build a metaverse where we can travel into using Virtual...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading