HomeCyber BalkansMalware posing as legitimate Go packages infects Linux and macOS users

Malware posing as legitimate Go packages infects Linux and macOS users

Published on

spot_img

The discovery of typosquatting in the popular “hypert” library used by developers for testing HTTP API clients has raised concerns in the cybersecurity community. Attackers have created fake versions of the “hypert” library with embedded remote code execution functions, posing a serious threat to unsuspecting users.

The malicious actors behind the typosquatting attack cloned the “hypert” library and released four fake versions with dangerous capabilities. These fake versions were disguised under similar but slightly altered names, such as github.com/shallowmulti/hypert, github.com/shadowybulk/hypert, github.com/belatedplanet/hypert, and github.com/thankfulmai/hypert. By exploiting common typing errors or variations in domain names, the attackers lured users into downloading these fake packages, putting their systems at risk.

Of particular concern is the package named “—–shallowmulti/hypert”, which was found to execute shell commands to download and run a malicious script from a typo variation of the legitimate banking domain alturacu.com. This malicious script could potentially lead to the installation of malware, theft of sensitive information, or unauthorized access to systems.

In response to this security threat, efforts are underway to remove the malicious packages from the Go Module Mirror and flag associated Github repositories and user accounts. By taking these steps, the cybersecurity community aims to mitigate the risk posed by typosquatting attacks and protect users from falling victim to such malicious activities.

It is essential for users to remain vigilant and verify the authenticity of software packages they download. Checking the source, verifying the package name, and scrutinizing any suspicious behavior can help prevent falling prey to typosquatting attacks. By staying informed and adopting best practices in cybersecurity, users can reduce the likelihood of compromising their systems and data to malicious actors.

Source link

Latest articles

GitHub Data Breach Exposes Thousands of Software Supply Chain Secrets

GitHub Actions, a popular CI/CD service utilized by developers to automate software builds and...

Participation Needed for Wellbeing in the Cybersecurity Sector

In the realm of cybersecurity, a pressing issue looms large - the wellbeing of...

Knostic secures $11 million to prevent data leaks in Enterprise AI

Knostic, a cybersecurity startup, has secured $11 million in funding to further develop its...

Infostealers fueled cyberattacks and stole 2.1B credentials last year

Last year, cybercriminals unleashed a wave of havoc using information-stealing malware, resulting in the...

More like this

GitHub Data Breach Exposes Thousands of Software Supply Chain Secrets

GitHub Actions, a popular CI/CD service utilized by developers to automate software builds and...

Participation Needed for Wellbeing in the Cybersecurity Sector

In the realm of cybersecurity, a pressing issue looms large - the wellbeing of...

Knostic secures $11 million to prevent data leaks in Enterprise AI

Knostic, a cybersecurity startup, has secured $11 million in funding to further develop its...