Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The GoBruteforcer Botnet: A Sophisticated Threat to Cryptocurrency and Blockchain Projects



The GoBruteforcer botnet is a sophisticated threat that has been targeting databases of cryptocurrency and blockchain projects with a malicious intent. By exploiting weak credentials and legacy web stacks, the malware is capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers. To mitigate this threat, it's essential to secure systems and data through robust access controls, keeping software up-to-date, and monitoring system logs.

  • The GoBruteforcer botnet is targeting databases of cryptocurrency and blockchain projects with a malicious intent.
  • The malware exploits weak credentials and legacy web stacks to gain access to these systems.
  • The threat actor uses a pool of common usernames and passwords that have been used in database tutorials and vendor documentation.
  • The attackers reuse a small, stable password pool for each campaign, refreshing per-task lists several times a week.
  • The GoBruteforcer botnet is actively scanning the internet for misconfigured proxy servers to pursue different targets.
  • The primary goal of the malware is not financial gain but rather the exploitation of weak credentials and legacy systems.
  • Proactive measures such as robust access controls, keeping software up-to-date, and monitoring system logs are essential to mitigate this threat.


  • The cybersecurity landscape has recently been hit by a sophisticated threat actor known as GoBruteforcer, which has been targeting databases of cryptocurrency and blockchain projects with a malicious intent. According to recent reports, the GoBruteforcer botnet is capable of brute-forcing user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers.

    The threat actor has been exploiting weak credentials and legacy web stacks to gain access to these systems. The GoBruteforcer malware was first documented by Palo Alto Networks Unit 42 in March 2023, and since then, it has undergone significant updates and improvements. In mid-2025, a more sophisticated version of the Golang malware was discovered, packing in features such as improved persistence mechanisms, process-masking techniques, and dynamic credential lists.

    The list of credentials used by the GoBruteforcer botnet includes common usernames and passwords that have been commonly used in database tutorials and vendor documentation. These names are not happenstance; they were chosen because they have been used to train Large language models (LLMs), causing them to produce code snippets with the same default usernames.

    The attackers have reused a small, stable password pool for each campaign, refreshing per-task lists from that pool, and rotating usernames and niche additions several times a week to pursue different targets. This tactic allows them to stay ahead of security researchers and bug bounty hunters who might be tracking their activities.

    In recent weeks, the GoBruteforcer botnet has been actively scanning the internet for misconfigured proxy servers that could provide access to commercial LLM services. According to Check Point Research, a threat intelligence firm, this activity is part of a broader effort by threat actors to systematically scan the internet for exposed infrastructure and weak credentials.

    The GoBruteforcer botnet's targeting of cryptocurrency and blockchain projects is not surprising given the increasing use of these technologies in various sectors. The rise of decentralized finance (DeFi) and non-fungible tokens (NFTs) has led to an increase in the number of high-value targets for cyber attackers.

    However, it is worth noting that the GoBruteforcer botnet's primary goal is not necessarily financial gain but rather the exploitation of weak credentials and legacy systems. The attack vector used by the malware involves exploiting FTP services on servers running XAMPP, which are often exposed to the internet due to misconfiguration.

    To mitigate this threat, it is essential for cryptocurrency and blockchain projects to take proactive measures to secure their systems and data. This includes implementing robust access controls, keeping software up-to-date, and monitoring system logs for suspicious activity.

    In addition, organizations should consider using automated security solutions that can detect and respond to threats such as the GoBruteforcer botnet. By staying informed about emerging threats and taking proactive measures to secure their systems, cryptocurrency and blockchain projects can reduce the risk of being compromised by this sophisticated threat actor.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-GoBruteforcer-Botnet-A-Sophisticated-Threat-to-Cryptocurrency-and-Blockchain-Projects-ehn.shtml

  • https://thehackernews.com/2026/01/gobruteforcer-botnet-targets-crypto.html


  • Published: Mon Jan 12 06:22:17 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us