A cracked malicious version of a Go package lay undetected online for years

0
1


  • Someone forked a popular database module and fitted it with malware
  • The malicious fork was then cached and stored indefinitely
  • It was then creatively hidden in plain sight to target Go developers

A software supply chain attack targeting developers on the Go platform was apparently hiding in plain sight for three years to spread malware, experts have warned.

Cybersecurity researchers from Socket Security uncovered and publicly spoke about the campaign, which started back in 2021, when someone took a relatively popular database module called BoltDB on GitHub and forked it. In the fork, they added malicious code, which granted the attacker backdoor access to compromised computers.

LEAVE A REPLY

Please enter your comment!
Please enter your name here