Malicious Go SSH Tool Steals Credentials Via Telegram Bot Alert

Fake Go SSH Tool Steals Credentials via Telegram Instead of Brute-Forcing Servers

  • Researchers found a fake Go module that steals SSH credentials instead of providing legitimate brute-force functionality.
  • The malicious module sends stolen logins to a Telegram bot once a successful SSH login occurs.
  • The tool’s wordlist targets common usernames and weak passwords on random IPv4 SSH servers.
  • The campaign is linked to the now-inaccessible IllDieAnyway GitHub account, but the module remains available online.
  • The exfiltration method uses encrypted Telegram traffic, helping attackers avoid basic egress monitoring.

Cybersecurity researchers reported finding a Go programming module that pretends to be a brute-force tool for SSH logins but is designed to secretly collect and transmit stolen credentials to the module’s creator. The tool, named “golang-random-ip-ssh-bruteforce,” first appeared on June 24, 2022, and remains available on the software repository pkg.go[.]dev.

- Advertisement -

According to researchers at Socket, the module scans random public IPv4 addresses on TCP port 22 to find SSH servers, then tries logging in using a small list of common usernames and passwords. When a login attempt succeeds, the tool immediately exfiltrates the server’s IP address, username, and password to a hard-coded Telegram bot managed by the attacker. “On the first successful login, the package sends the target IP address, username, and password to a hard-coded Telegram bot controlled by the threat actor,” researcher Kirill Boychenko stated.

The username list only includes “root” and “admin,” while the passwords are common weak choices such as “admin,” “12345678,” “password,” and similar. The module disables host key verification by using the “ssh.InsecureIgnoreHostKey” callback, allowing it to accept connections from any SSH server even if its identity is unknown. The tool operates in an infinite loop, repeatedly generating new IP addresses and attempting concurrent logins with the preset credentials.

Messages with stolen credentials are sent through Telegram’s API to an account labeled “@io_ping” (Gett), using a recipient bot called “@sshZXC_bot” (ssh_bot). Researchers say the activity traces back to the IllDieAnyway (G3TT) GitHub account, which also hosted Hacking tools like an IP port scanner and a PHP command-and-control botnet called Selica-C2. While the GitHub account is now offline, historical snapshots and a YouTube channel remain accessible, showing the creator sharing hacking-related content in Russian.

Socket noted that the tool uses the scanning operators’ own internet addresses, distributing risk away from the original threat actor. The Telegram channel uses regular HTTPS traffic, which can make these exfiltrations appear like normal web use and avoid detection by standard network filters.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Nvidia rallies on China comeback; Wall Street eyes $300 soon

NVIDIA plans to raise H200 chip production to meet strong demand from China.President Donald...

Aave CEO Urges RWA Push After Governance Vote Rejection Now.

Stani Kulechov outlined a wider strategy after a governance vote rejected a proposal to...

SEC Commissioner Caroline Crenshaw Resigns; Crypto Win Ahead

Caroline Crenshaw has resigned from the Securities and Exchange Commission, announced in a Friday...

CryptoQuant: Whale ‘Reaccumulation’ Narrative Overstated Now

Onchain data from CryptoQuant indicate claims of large-scale Bitcoin reaccumulation by whales are overstated.Exchange...

XRP Eyes Rally as ETFs and Buy Signal Boost 2026 Hopes Surge

Ripple settled its US lawsuit in 2025, helping XRP reach a $3.65 all-time high...
- Advertisement -

Must Read

17 Best Audiobooks On Blockchain Technology For Beginners

If you're looking to dive into the world of blockchain technology, you're in for a treat. The field is rapidly evolving and the potential...
Bitcoin (BTC) $ 90,159.00 1.82%
Ethereum (ETH) $ 3,124.96 4.19%
XRP (XRP) $ 2.03 8.54%
Bittensor (TAO) $ 250.43 9.22%
Polkadot (DOT) $ 2.17 8.62%
Cardano (ADA) $ 0.393442 10.59%
Chainlink (LINK) $ 13.27 5.08%
Hyperliquid (HYPE) $ 24.61 1.05%
Monero (XMR) $ 429.24 3.49%
Hedera (HBAR) $ 0.121453 6.68%
Toncoin (TON) $ 1.82 8.95%