Ethical Hacking News
A malicious Go module has been discovered that exposes user passwords and deploys a Linux backdoor named Rekoobe. This threat highlights the importance of keeping software up-to-date and monitoring for suspicious activity to prevent exploitation. Cybersecurity experts urge users to exercise caution when using Go-based applications and to regularly update their software to prevent this type of attack.
The malicious Go module poses a threat to users who rely on Go-based applications, particularly those in finance and government sectors. The module injects malicious code into the "ssh/terminal/terminal.go" file, allowing attackers to exfiltrate sensitive information without user knowledge. The module is disguised as legitimate code, making it difficult for users to detect and remove. Regular software updates and monitoring for suspicious activity are crucial in preventing exploitation. Cybersecurity experts urge caution when using Go-based applications and emphasize the importance of staying vigilant in identifying and mitigating such threats.
The cybersecurity landscape is constantly evolving, with new threats emerging every day. Recently, researchers have uncovered a malicious Go module that threatens to compromise user passwords and deploy a Linux backdoor named Rekoobe. This malicious module is designed to impersonate the legitimate "golang.org/x/crypto" codebase, making it challenging for users to identify and remove.
The malicious module, located at github.com/xinfeisoft/crypto, is a Go package that claims to provide cryptographic functions. However, upon closer inspection, researchers discovered that the module injects malicious code into the "ssh/terminal/terminal.go" file, which is responsible for reading input from users like passwords. This allows the attacker to exfiltrate sensitive information without the user's knowledge.
The malicious code is cleverly disguised as a legitimate function, making it difficult for users to detect and remove. The module also uses GitHub Raw as a rotating pointer to avoid detection, further complicating the issue.
Researchers warn that this malicious module poses a significant threat to users who rely on Go-based applications, particularly those in the finance and government sectors. The attackers can use this module to steal sensitive information, create persistent access via SSH, and even deliver additional payloads to compromise the system further.
The impact of this malicious module goes beyond just password exposure. It also highlights the importance of keeping software up-to-date and monitoring for suspicious activity. Researchers stress that defenders should anticipate similar supply chain attacks targeting other "credential edge" libraries and more indirection through hosting surfaces to rotate infrastructure without republishing code.
In light of this new threat, cybersecurity experts urge users to exercise caution when using Go-based applications and to regularly update their software to prevent exploitation. The researchers involved in the discovery of this malicious module emphasize the importance of staying vigilant and proactive in identifying and mitigating such threats.
The implications of this attack are far-reaching, highlighting the need for robust security measures to protect against sophisticated supply chain attacks. By understanding the tactics used by attackers and taking steps to prevent them, cybersecurity professionals can help safeguard sensitive information and prevent further breaches.
Related Information:
https://www.ethicalhackingnews.com/articles/A-Tainted-Package-A-Malicious-Go-Module-Exposes-Passwords-and-Deploys-a-Linux-Backdoor-ehn.shtml
https://thehackernews.com/2026/02/malicious-go-crypto-module-steals.html
https://cybersecuritynews.com/malicious-go-crypto-module-steals-passwords-and-deploy-rekoobe/
https://intezer.com/blog/linux-rekoobe-operating-with-new-undetected-malware-samples/
Published: Fri Feb 27 12:59:18 2026 by llama3.2 3B Q4_K_M