{"id":102,"date":"2026-02-27T17:09:39","date_gmt":"2026-02-27T17:09:39","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=102"},"modified":"2026-02-27T17:09:39","modified_gmt":"2026-02-27T17:09:39","slug":"malicious-go-crypto-module-steals-passwords-deploys-rekoobe-backdoor","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=102","title":{"rendered":"Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Feb 27, 2026<\/span><\/span><span class=\"p-tags\">Malware \/ Linux Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdXNmYRKw13_BHE7B7MMtqTTpJXBkgDzl2sH31t0L0_VCl9uJbWPS2yg0j0jz0XJovSYryM4NcSCAZdtTDsoRa2d6y3U84K9TDQYJSObLgaJXXh8juWmP6liqj_uirhZvKjR0dqYZ-J2mwTnmEIYIKfAoC9BY3yL2xhfLD_NbwVKzekKwoI3u4iSzU44Xn\/s1700-e365\/hackers.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><\/a><\/div>\n<p>Cybersecurity researchers have disclosed details of a malicious Go module that&#8217;s designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe.<\/p>\n<p>The Go module, github[.]com\/xinfeisoft\/crypto, impersonates the legitimate \u00abgolang.org\/x\/crypto\u00bb codebase, but injects malicious code that&#8217;s responsible for exfiltrating secrets entered via terminal password prompts to a remote endpoint, fetches a shell script in response, and executes it.<\/p>\n<p>\u00abThis activity fits namespace confusion and impersonation of the legitimate golang.org\/x\/crypto subrepository (and its GitHub mirror github.com\/golang\/crypto),\u00bb Socket security researcher Kirill Boychenko <a href=\"https:\/\/socket.dev\/blog\/malicious-go-crypto-module-steals-passwords-and-deploys-rekoobe-backdoor\" rel=\"noopener\" target=\"_blank\">said<\/a>. \u00abThe legitimate project identifies go.googlesource.com\/crypto as canonical and treats GitHub as a mirror, a distinction the threat actor abuses to make github.com\/xinfeisoft\/crypto look routine in dependency graphs.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/sse-customer-awards-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5Ij_-TeqFMEsRFzgRRFzSRlVK6oHCncN_eJ2fkOdsA_1tN9HQbAlEEife2Z2JUt1lPv4st5n9KZP84jGEYY9Up6BQ7QE-N5rs6OhzL5thxGzVxnMx3JH9cGRLi9S5Kl-iV5PgjBeTdkBLnv_inF8UUAo88iqdmgJuPIc_6qiPyUMXwFyZWbZvkZkcRXSw\/s728-e100\/gartner-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Specifically, the backdoor has been placed within the \u00abssh\/terminal\/terminal.go\u00bb file, so that every time a victim application invokes ReadPassword() \u2013 a function supposedly meant to read input like passwords from a terminal \u2013 it causes that information to capture interactive secrets.<\/p>\n<p>The main responsibility of the downloaded script is to function as a Linux stager, appending a threat actor&#8217;s SSH key to the \u00ab\/home\/ubuntu\/.ssh\/authorized_keys\u00bb file, set iptables default policies to ACCEPT in an attempt to loosen firewall restrictions, and retrieve additional payloads from an external server while disguising them with the .mp5 extension.<\/p>\n<p>Of the two payloads, one is a helper that tests internet connectivity and attempts to communicate with an IP address (\u00ab154.84.63[.]184\u00bb) over TCP port 443. The program likely functions as a recon or loader, Socket noted.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjNfof5SVhlSVWgulcCtH4nVuXC9oVyXj97l_qJOhch8piParafaTuHDI6OlLyiHuQgIyvthX7Y716raMMFIdCk4H7PT1LMWYLa_weutNtuSSt2QWYOch1e7F8ZXt3xMk7aqj1_cnbqSvilyuM4TwdL_9-77Qx-U-I7LVd4Sul770WUhHXEToy152qlnCHp\/s1700-e365\/git.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjNfof5SVhlSVWgulcCtH4nVuXC9oVyXj97l_qJOhch8piParafaTuHDI6OlLyiHuQgIyvthX7Y716raMMFIdCk4H7PT1LMWYLa_weutNtuSSt2QWYOch1e7F8ZXt3xMk7aqj1_cnbqSvilyuM4TwdL_9-77Qx-U-I7LVd4Sul770WUhHXEToy152qlnCHp\/s1700-e365\/git.jpg\" alt=\"\" border=\"0\" data-original-height=\"692\" data-original-width=\"907\"\/><\/a><\/div>\n<p>The second downloaded payload has been assessed to be Rekoobe, a known Linux trojan that has been detected in the wild <a href=\"https:\/\/vms.drweb.com\/virus\/?i=7754026&amp;lng=en\" rel=\"noopener\" target=\"_blank\">since at least 2015<\/a>. The <a href=\"https:\/\/intezer.com\/blog\/linux-rekoobe-operating-with-new-undetected-malware-samples\/\" rel=\"noopener\" target=\"_blank\">backdoor<\/a> is <a href=\"https:\/\/blog.techevo.uk\/analysis\/linux\/2024\/11\/30\/rekoobe-apt31-linux-backdoor.html\" rel=\"noopener\" target=\"_blank\">capable<\/a> of receiving commands from an attacker-controlled server to download more payloads, steal files, and execute a reverse shell. As recently as August 2023, Rekoobe has been put to use by Chinese nation-state groups like APT31.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ztw-hands-on-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhC66R4wPZ8qksTJukqlCCmrHCUX65DnpWW1nKnkOhy0Poe219tacbU6h09qEfUgRHxoObBazf3SVJ4OAd_iVd0EFecj-vskZSfroQ7rh0XyxQd6Ep_zNgqDW95YU4zG1Gpin8rHPK8Rqu_1KV7tf-G-7JJhxOVHhRJDWnj0qfq82uZSAvAG2rxK-Fe5fwd\/s728-e100\/ThreatLocker-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>While the package <a href=\"https:\/\/pkg.go.dev\/github.com\/xinfeisoft\/crypto\" rel=\"noopener\" target=\"_blank\">still remains listed<\/a> on pkg.go.dev, the Go security team has taken steps to block the package as malicious.<\/p>\n<p>\u00abThis campaign will likely repeat because the pattern is low-effort and high-impact: a lookalike module that hooks a high-value boundary (ReadPassword), uses GitHub Raw as a rotating pointer, then pivots into curl | sh staging and Linux payload delivery,\u00bb Boychenko said.<\/p>\n<p>\u00abDefenders should anticipate similar supply chain attacks targeting other &#8216;credential edge&#8217; libraries (SSH helpers, CLI auth prompts, database connectors) and more indirection through hosting surfaces to rotate infrastructure without republishing code.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Feb 27, 2026Malware \/ Linux Security Cybersecurity researchers have disclosed details of a malicious Go module that&#8217;s designed to harvest passwords, create persistent access via SSH, and deliver a&hellip;<\/p>\n","protected":false},"author":1,"featured_media":103,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[179,143,297,33,294,296,298,295],"class_list":["post-102","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-backdoor","tag-crypto","tag-deploys","tag-malicious","tag-module","tag-passwords","tag-rekoobe","tag-steals"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=102"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/102\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/103"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}