BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Malicious Go Module Hijacks Linux Passwords

Malicious Go Module Impersonates Crypto Library to Steal Secrets and Deploy Rekoobe Backdoor

  • A malicious Go module impersonates a legitimate “golang.org/x/crypto” library to steal secrets.
  • The malware harvests passwords, creates SSH backdoor access, and deploys the Linux backdoor Rekoobe.
  • The Rekoobe backdoor, linked to Chinese nation-state groups like APT31, enables downloading more payloads and executing reverse shells.
  • The Go security team has blocked the malicious package, but researchers warn similar low-effort, high-impact attacks are likely to repeat.

Cybersecurity researchers disclosed on February 27, 2026, that a malicious Go module is harvesting terminal passwords and deploying the persistent Rekoobe Linux backdoor. The module, hosted under a deceptive name, infiltrates victim applications by impersonating legitimate code.

- Advertisement -

Specifically, the fake “github[.]com/xinfeisoft/crypto” module injects malicious code into the “ssh/terminal/terminal.go” file. Consequently, when an application uses the ReadPassword() function, secrets are captured and sent to a remote server.

The campaign then downloads a staging script to create persistent SSH access and loosen firewall rules. Meanwhile, additional payloads disguised with a .mp5 extension are retrieved from an external server.

One payload is a connectivity-testing helper program. However, the second is identified as Rekoobe, a known Linux trojan active since at least 2015.

This backdoor is capable of receiving commands to download payloads, steal files, and execute a reverse shell. As recently as August 2023, Rekoobe has been used by Chinese nation-state groups like APT31.

- Advertisement -

Socket security researcher Kirill Boychenko said, “This activity fits namespace confusion and impersonation of the legitimate golang.org/x/crypto subrepository.” The Go security team has now taken steps to block the malicious package listed on pkg.go.dev.

Boychenko warned similar supply chain attacks are likely to repeat because the pattern is low-effort and high-impact. Defenders should anticipate more attacks targeting credential libraries.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

TD Cowen Downgrades MSTR Target, Calls Sharplink a ‘Buy’

TD Cowen has initiated coverage of Ethereum treasury firm Sharplink with a "buy" rating,...

McLaren Racing Joins Hedera Governing Council

McLaren Racing has joined the Hedera Council, gaining a governance role and launching digital...

Comic raised $50K for Gaza via staged memecoin rug pulls.

Comedian William Banks orchestrated a fabricated prison break video that garnered over 10 million...

TON Blockchain Cuts Block Times, Boosts Speed 6-Fold

The Open Network (TON) released its Catchain 2.0 consensus upgrade on Thursday, slashing block...

Insider Sell-Offs: Top Apple Executives Sold $24M In Stock In April

Two senior Apple executives sold a combined $24.2 million worth of corporate stock in...

Must Read

5 Best Hacking eBooks for Beginners

In this article we present the 5 Best Hacking eBooks for beginners as ranked by our editorial teamWelcome to the world of hacking, where...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading