HomeCyber BalkansMalware posing as legitimate Go packages infects Linux and macOS users

Malware posing as legitimate Go packages infects Linux and macOS users

Published on

spot_img

The discovery of typosquatting in the popular “hypert” library used by developers for testing HTTP API clients has raised concerns in the cybersecurity community. Attackers have created fake versions of the “hypert” library with embedded remote code execution functions, posing a serious threat to unsuspecting users.

The malicious actors behind the typosquatting attack cloned the “hypert” library and released four fake versions with dangerous capabilities. These fake versions were disguised under similar but slightly altered names, such as github.com/shallowmulti/hypert, github.com/shadowybulk/hypert, github.com/belatedplanet/hypert, and github.com/thankfulmai/hypert. By exploiting common typing errors or variations in domain names, the attackers lured users into downloading these fake packages, putting their systems at risk.

Of particular concern is the package named “—–shallowmulti/hypert”, which was found to execute shell commands to download and run a malicious script from a typo variation of the legitimate banking domain alturacu.com. This malicious script could potentially lead to the installation of malware, theft of sensitive information, or unauthorized access to systems.

In response to this security threat, efforts are underway to remove the malicious packages from the Go Module Mirror and flag associated Github repositories and user accounts. By taking these steps, the cybersecurity community aims to mitigate the risk posed by typosquatting attacks and protect users from falling victim to such malicious activities.

It is essential for users to remain vigilant and verify the authenticity of software packages they download. Checking the source, verifying the package name, and scrutinizing any suspicious behavior can help prevent falling prey to typosquatting attacks. By staying informed and adopting best practices in cybersecurity, users can reduce the likelihood of compromising their systems and data to malicious actors.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...