Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

Avatar
Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems. “The threat actor has published at least seven packages impersonating widely used Go libraries, including one (github[.]com/shallowmulti/hypert) that appears to target financial-sector developers
[[{“value”:”Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems.
“The threat actor has published at least seven packages impersonating widely used Go libraries, including one (github[.]com/shallowmulti/hypert) that appears to target financial-sector developers”}]] The Hacker News 

Total
0
Shares
Previous Post

Catalan court orders former NSO Group executives be indicted for spyware abuses

Next Post

CISA, VMware warn of new vulnerabilities being exploited by hackers

Related Posts

New Windows Task Scheduler Bugs Let Attackers Bypass UAC and Tamper with Logs

Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service that could be exploited by local attackers to achieve privilege escalation and erase logs to cover up evidence of malicious activities. The issues have been uncovered in a binary named "schtasks.exe," which enables an administrator to create, delete, query, change,
Avatar
Read More

AI in Cyber Online

[[{“value”:” May 8, 2024Location: Online As technology reshapes the global scene, fortifying digital defenses against evolving cyber threats…
Avatar
Read More