Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Cryptic Menace: Linux Wiper Malware Exposed in GitHub's Codebase


A recent supply-chain attack has exposed a Linux wiper malware hidden within Golang modules published on GitHub. The malicious code targets Linux-based servers and developer environments, leading to irreversible data loss and system failure. Learn more about this critical threat and how to prevent it in our latest article.

  • A recent supply-chain attack has been uncovered, revealing a malicious campaign of disk-wiping malware hidden within Golang modules published on GitHub.
  • The attack relied on three malicious Go modules that included "highly obfuscated code" for retrieving remote payloads and executing them.
  • The done.sh script runs a 'dd' command, which overwrites every byte of data on the primary storage volume, /dev/sda, leading to irreversible data loss and system failure.
  • The attack's goal is to render the system unbootable and unrecoverable by populating the entire disk with zeroes.
  • Researchers warn that even minimal exposure to the analyzed destructive modules can significantly impact systems like complete data loss.
  • Developers are advised to review their dependencies, update their projects to the latest versions, and implement additional safeguards such as source code analysis tools to detect and prevent similar attacks in the future.



  • A recent supply-chain attack has been uncovered, revealing a malicious campaign of disk-wiping malware hidden within Golang modules published on GitHub. The malicious code, which was discovered last month, appears to be specifically designed for Linux-based servers and developer environments.

    The attack relied on three malicious Go modules that included "highly obfuscated code" for retrieving remote payloads and executing them. These modules were identified as github.com/truthfulpharm/prototransform, github.com/blankloggia/go-mcp, and github.com/steelpoor/tlsproxy. An analysis of the code revealed that it used a Bash script named done.sh to execute a destructive payload.

    The done.sh script runs a 'dd' command, which overwrites every byte of data on the primary storage volume, /dev/sda, leading to irreversible data loss and system failure. The script verifies that it runs in a Linux environment (runtime.GOOS == "linux") before attempting to execute.

    Upon further examination, it becomes clear that the target of this attack is the primary storage volume, which holds critical system data, user files, databases, and configurations. The malicious code effectively renders the system unbootable and unrecoverable by populating the entire disk with zeroes.

    "The script completely destroys the file system structure, operating system, and all user data, rendering the system unbootable and unrecoverable," said Socket researchers, who analyzed the attack. This level of destruction highlights the severity of this supply-chain attack and the importance of vigilance in protecting against such threats.

    The decentralized nature of the Go ecosystem, which lacks proper checks, has been exploited by attackers to create module namespaces that appear legitimate. This makes it challenging for developers to identify and integrate malicious code into their projects.

    Researchers warn that even minimal exposure to the analyzed destructive modules can significantly impact systems like complete data loss. The fact that this attack was able to evade detection underscores the need for more robust security measures in software development and deployment processes.

    As cybersecurity experts continue to monitor the situation, it is essential to remain vigilant and take steps to protect against such threats. Developers, administrators, and users of Linux-based servers must be aware of this attack and take necessary precautions to prevent their systems from being compromised.

    In light of this discovery, researchers are calling on developers to review their dependencies and update their projects to the latest versions. Furthermore, security experts recommend implementing additional safeguards, such as source code analysis tools, to detect and prevent similar attacks in the future.

    The revelation of this malicious campaign highlights the ever-evolving nature of cybersecurity threats. As new vulnerabilities are discovered, it is crucial for developers and users alike to stay informed and take proactive measures to protect their systems against such attacks.

    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-Cryptic-Menace-Linux-Wiper-Malware-Exposed-in-GitHubs-Codebase-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/linux-wiper-malware-hidden-in-malicious-go-modules-on-github/

  • https://www.betterworldtechnology.com/post/devastating-supply-chain-attack-malicious-go-modules-wipe-linux-systems


  • Published: Tue May 6 04:43:16 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us