HomeCyber SecurityMalicious Go Module Poses as SSH Brute-Power Instrument, Steals Credentials by way...

Malicious Go Module Poses as SSH Brute-Power Instrument, Steals Credentials by way of Telegram Bot


Aug 24, 2025Ravie LakshmananMalware / Provide Chain Safety

Malicious Go Module Poses as SSH Brute-Power Instrument, Steals Credentials by way of Telegram Bot

Cybersecurity researchers have found a malicious Go module that presents itself as a brute-force device for SSH however truly accommodates performance to discreetly exfiltrate credentials to its creator.

“On the primary profitable login, the bundle sends the goal IP deal with, username, and password to a hard-coded Telegram bot managed by the menace actor,” Socket researcher Kirill Boychenko stated.

The misleading bundle, named “golang-random-ip-ssh-bruteforce,” has been linked to a GitHub account referred to as IllDieAnyway (G3TT), which is at present now not accessible. Nevertheless, it continues to be obtainable on pkg.go[.]dev. It was printed on June 24, 2022.

The software program provide chain safety firm stated the Go module works by scanning random IPv4 addresses for uncovered SSH providers on TCP port 22, then trying to brute-force the service utilizing an embedded username-password checklist and exfiltrating the profitable credentials to the attacker.

A notable facet of the malware is that it intentionally disables host key verification by setting “ssh.InsecureIgnoreHostKey” as a HostKeyCallback, thereby permitting the SSH shopper to just accept connections from any server no matter their identification.

The wordlist is pretty easy, together with solely two usernames root and admin, and pairing them in opposition to weak passwords like root, check, password, admin, 12345678, 1234, qwerty, webadmin, webmaster, techsupport, letmein, and Passw@rd.

Cybersecurity

The malicious code runs in an infinite loop to generate the IPv4 addresses, with the bundle trying concurrent SSH logins from the wordlist.

The main points are transmitted to a menace actor-controlled Telegram bot named “@sshZXC_bot” (ssh_bot) by way of the API, which then acknowledges the receipt of the credentials. The messages are despatched by the bot to an account with the deal with “@io_ping” (Gett).

SSH Brute-Force Tool

An Web Archive snapshot of the now-removed GitHub account reveals that IllDieAnyway, aka G3TT’s software program portfolio, included an IP port scanner, an Instagram profile data and media parser, and even a PHP-based command-and-control (C2) botnet referred to as Selica-C2.

Their YouTube channel, which stays accessible, hosts varied short-form movies on “The best way to hack a Telegram bot” and what they declare to be the “strongest SMS bomber for the Russian Federation,” which may ship spam SMS texts and messages to VK customers utilizing a Telegram bot. It is assessed that the menace actor is of Russian origin.

“The bundle offloads scanning and password guessing to unwitting operators, spreads danger throughout their IPs, and funnels the successes to a single menace actor-controlled Telegram bot,” Boychenko stated.

“It disables host key verification, drives excessive concurrency, and exits after the primary legitimate login to prioritize fast seize. As a result of the Telegram Bot API makes use of HTTPS, the visitors appears like regular internet requests and may slip previous coarse egress controls.”

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments