A cracked malicious version of a Go package lay undetected online for years

zeeforce
3 Min Read




  • Someone forked a popular database module and fitted it with malware
  • The malicious fork was then cached and stored indefinitely
  • It was then creatively hidden in plain sight to target Go developers

A software supply chain attack targeting developers on the Go platform was apparently hiding in plain sight for three years to spread malware, experts have warned.

Cybersecurity researchers from Socket Security uncovered and publicly spoke about the campaign, which started back in 2021, when someone took a relatively popular database module called BoltDB on GitHub and forked it. In the fork, they added malicious code, which granted the attacker backdoor access to compromised computers.



Source link

Share This Article
Leave a comment
Optimized by Optimole
Verified by MonsterInsights