HomeCyber BalkansMalware posing as legitimate Go packages infects Linux and macOS users

Malware posing as legitimate Go packages infects Linux and macOS users

Published on

spot_img

The discovery of typosquatting in the popular “hypert” library used by developers for testing HTTP API clients has raised concerns in the cybersecurity community. Attackers have created fake versions of the “hypert” library with embedded remote code execution functions, posing a serious threat to unsuspecting users.

The malicious actors behind the typosquatting attack cloned the “hypert” library and released four fake versions with dangerous capabilities. These fake versions were disguised under similar but slightly altered names, such as github.com/shallowmulti/hypert, github.com/shadowybulk/hypert, github.com/belatedplanet/hypert, and github.com/thankfulmai/hypert. By exploiting common typing errors or variations in domain names, the attackers lured users into downloading these fake packages, putting their systems at risk.

Of particular concern is the package named “—–shallowmulti/hypert”, which was found to execute shell commands to download and run a malicious script from a typo variation of the legitimate banking domain alturacu.com. This malicious script could potentially lead to the installation of malware, theft of sensitive information, or unauthorized access to systems.

In response to this security threat, efforts are underway to remove the malicious packages from the Go Module Mirror and flag associated Github repositories and user accounts. By taking these steps, the cybersecurity community aims to mitigate the risk posed by typosquatting attacks and protect users from falling victim to such malicious activities.

It is essential for users to remain vigilant and verify the authenticity of software packages they download. Checking the source, verifying the package name, and scrutinizing any suspicious behavior can help prevent falling prey to typosquatting attacks. By staying informed and adopting best practices in cybersecurity, users can reduce the likelihood of compromising their systems and data to malicious actors.

Source link

Latest articles

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

More like this

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...