Sunday, May 18, 2025
Homecyber securityHackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem in April 2025.

Hackers have weaponized three malicious Go modules-github[.]com/truthfulpharm/prototransform, github[.]com/blankloggia/go-mcp, and github[.]com/steelpoor/tlsproxy-to deploy devastating disk-wiping malware.

Leveraging the decentralized nature of Go’s module system, where developers directly import dependencies from public repositories like GitHub sans centralized gatekeeping, attackers exploit namespace confusion and minimal validation to masquerade their malicious code as legitimate libraries.

- Advertisement - Google News
Supply‑Chain Hack
Multiple similarly named Go modules

This openness, while a strength for flexibility, has become a critical vulnerability, enabling typosquatting and namespace ambiguity to trick developers into integrating destructive payloads into their projects.

Obfuscated Code Unleashes Catastrophic Payloads

The malicious modules employ advanced obfuscation techniques, such as array-based string manipulation, to conceal their intent, only revealing their destructive nature at runtime.

Upon execution, the code-specifically targeting Linux environments-fetches remote shell scripts from attacker-controlled domains like https://vanartest[.]website and https://kaspamirror[.]icu.

One such script, dubbed “done.sh,” uses the Unix utility ‘dd’ to overwrite the primary storage device (/dev/sda) with zeros from /dev/zero.

This obliterates the file system, operating system, and all user data, rendering systems unbootable and data unrecoverable.

The impact is catastrophic: complete data loss, prolonged operational downtime, and severe financial and reputational damage for affected organizations.

Socket’s security scanners flagged these suspicious behaviors, exposing payloads that execute with no window for response or mitigation, highlighting the lethal precision of modern supply chain attacks.

The real-world implications of this attack are dire, as even brief exposure can cripple critical infrastructure.

Unlike traditional malware that might steal data or demand ransom, this disk-wiping payload prioritizes irreversible destruction, ensuring no forensic recovery is possible.

This incident echoes past discoveries of typosquatted Go packages delivering malware loaders, signaling an escalating trend in open-source ecosystem exploitation.

According to the Report, Cybersecurity experts stress the urgent need for secure development practices, including proactive code audits, automated dependency scanning, and runtime monitoring.

Tools like Socket’s GitHub app and CLI offer real-time threat detection to block malicious modules before they infiltrate production environments.

As attackers refine their tactics, exploiting trust in public code, the Go community must prioritize robust dependency management and continuous vigilance to safeguard software supply chains from such devastating threats.

Indicators of Compromise (IOCs)

TypeDetails
Malicious Modulesgithub[.]com/truthfulpharm/prototransform
github[.]com/blankloggia/go-mcp
github[.]com/steelpoor/tlsproxy
Malicious URLshttps://vanartest[.]website/storage/de373d0df/a31546bf
https://kaspamirror[.]icu/storage/de373d0df/a31546bf (offline)
http://147.45.44[.]41/storage/de373d0df/ccd7b46d (offline)

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...