Gobruteforcer botnet targets Linux servers worldwide

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

The GoBruteforcer botnet, first documented in 2023, has evolved significantly in its 2025 version, as detailed by Check Point Research. This malware uses a modular structure involving web shells, downloaders, IRC bots, and bruteforcer modules to infiltrate systems. It focuses on services such as FTP, MySQL, PostgreSQL, and phpMyAdmin, targeting weak or default credentials on internet-exposed Linux servers.

Researchers estimate that more than 50,000 servers remain vulnerable, with millions of instances exposed: around 5.7 million FTP servers, 2.23 million MySQL servers, and 560,000 PostgreSQL servers operating on default ports. The botnet's success stems from widespread use of AI-suggested usernames like "appuser" and "myuser," alongside a database of 375 to 600 common weak passwords. These credential lists overlap with 2.44% of a collection of 10 million leaked passwords, making attacks viable despite the modest overlap rate. A 2024 Google Cloud Threat Horizons report noted that weak credentials facilitated 47.2% of initial cloud breaches, underscoring the method's effectiveness.

The updated IRC bot, now written in Go and obfuscated with Garbler, replaces an earlier C-based version. It employs process-masking techniques, renaming itself to "init" and hiding arguments to evade detection. Command-and-control servers distribute batches of 200 credentials, rotating profiles multiple times weekly. Infected machines scan up to 20 IP addresses per second with low bandwidth—about 64 kb/s outbound during FTP operations—and run 95 concurrent threads on 64-bit systems.

Some campaigns show financial motives, deploying tools to scan TRON wallets and sweep tokens from Binance Smart Chain. On one compromised server, analysts recovered a file with roughly 23,000 TRON addresses, with on-chain data confirming successful thefts. The botnet avoids private networks, cloud providers, and U.S. Department of Defense ranges to minimize detection risks. It also tailors attacks for sectors, using crypto-themed usernames or targeting XAMPP stacks with default FTP setups.

For resilience, it includes hardcoded fallback C2 addresses and promotes infected hosts as relays. Components update twice daily via MD5-verified scripts. To counter these threats, experts recommend strong passwords, disabling unused services, multi-factor authentication, and vigilant login monitoring.

Awọn iroyin ti o ni ibatan

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Àwòrán tí AI ṣe

Malicious npm packages steal developer credentials on multiple platforms

Ti AI ṣe iroyin Àwòrán tí AI ṣe

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

A new botnet known as GoBruteforcer has emerged, focusing on brute-force attacks against Linux servers. The threat was reported by IT Security News on January 12, 2026. Details highlight the botnet's specific targeting of these systems.

Ti AI ṣe iroyin

The pro-Russia hacktivist group CyberVolk has reemerged with a new ransomware-as-a-service platform called VolkLocker, supporting both Linux and Windows systems. First documented in 2024 by SentinelOne, the group returned after a period of inactivity caused by Telegram bans. Despite advanced automation via Telegram bots, the malware features significant encryption flaws that could allow victims to recover files without payment.

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

Ti AI ṣe iroyin

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

Ti AI ṣe iroyin

A 2022 data breach at password manager LastPass has resulted in prolonged cryptocurrency thefts, according to blockchain intelligence firm TRM Labs. The incident involved stolen user vaults that facilitated around $35 million in losses extending into 2025.

 

 

 

Ojú-ìwé yìí nlo kuki

A nlo kuki fun itupalẹ lati mu ilọsiwaju wa. Ka ìlànà àṣírí wa fun alaye siwaju sii.
Kọ