HomeCyber BalkansMalware posing as legitimate Go packages infects Linux and macOS users

Malware posing as legitimate Go packages infects Linux and macOS users

Published on

spot_img

The discovery of typosquatting in the popular “hypert” library used by developers for testing HTTP API clients has raised concerns in the cybersecurity community. Attackers have created fake versions of the “hypert” library with embedded remote code execution functions, posing a serious threat to unsuspecting users.

The malicious actors behind the typosquatting attack cloned the “hypert” library and released four fake versions with dangerous capabilities. These fake versions were disguised under similar but slightly altered names, such as github.com/shallowmulti/hypert, github.com/shadowybulk/hypert, github.com/belatedplanet/hypert, and github.com/thankfulmai/hypert. By exploiting common typing errors or variations in domain names, the attackers lured users into downloading these fake packages, putting their systems at risk.

Of particular concern is the package named “—–shallowmulti/hypert”, which was found to execute shell commands to download and run a malicious script from a typo variation of the legitimate banking domain alturacu.com. This malicious script could potentially lead to the installation of malware, theft of sensitive information, or unauthorized access to systems.

In response to this security threat, efforts are underway to remove the malicious packages from the Go Module Mirror and flag associated Github repositories and user accounts. By taking these steps, the cybersecurity community aims to mitigate the risk posed by typosquatting attacks and protect users from falling victim to such malicious activities.

It is essential for users to remain vigilant and verify the authenticity of software packages they download. Checking the source, verifying the package name, and scrutinizing any suspicious behavior can help prevent falling prey to typosquatting attacks. By staying informed and adopting best practices in cybersecurity, users can reduce the likelihood of compromising their systems and data to malicious actors.

Source link

Latest articles

Building Resilient AI Environments Across Cloud, Data, and M365 Webinar

Title: Navigating the Complex Landscape of AI Resilience in ANZ Organizations As the integration of...

Apache OFBiz RCE Vulnerability Exploits Password Change Restrictions to Bypass Authentication

Critical Authentication Bypass Vulnerability Discovered in Apache OFBiz A serious vulnerability has been identified in...

Three-Quarters of Companies Aware They Ship Vulnerable Code, According to Checkmarx

In a troubling revelation, recent studies have shown that three-quarters of organizations acknowledge shipping...

Microsoft Disrupts Malware-Signing Service Linked to Ransomware Attacks

On Tuesday, Microsoft announced a significant disruption in a malware-signing-as-a-service (MSaaS) operation that exploited...

More like this

Building Resilient AI Environments Across Cloud, Data, and M365 Webinar

Title: Navigating the Complex Landscape of AI Resilience in ANZ Organizations As the integration of...

Apache OFBiz RCE Vulnerability Exploits Password Change Restrictions to Bypass Authentication

Critical Authentication Bypass Vulnerability Discovered in Apache OFBiz A serious vulnerability has been identified in...

Three-Quarters of Companies Aware They Ship Vulnerable Code, According to Checkmarx

In a troubling revelation, recent studies have shown that three-quarters of organizations acknowledge shipping...