Go to listing page

Golang-based GoBruteforcer Malware Targets Popular Web Services

Golang-based GoBruteforcer Malware Targets Popular Web Services
A new Golang-based botnet named GoBruteforcer has been spotted scanning and infecting popular web servers, including FTP and MySQL. The botnet, hosted on a legitimate website, deploys an Internet Relay Chat (IRC) bot on compromised servers and leverages it to communicate with the attacker's C2 server to obtain further instructions.

A peek into GoBruteforcer 

Palo Alto Networks researchers revealed that GoBruteforcer is compatible with multiple processor architectures, including x86, x64, and ARM.
  • The malware requires certain special conditions, such as the use of specific arguments at the time of execution, and targeted services being installed already with weak passwords. It executes only when these conditions are met.
  • It attempts to obtain access to vulnerable Unix-like platforms (collectively called *nix) by brute forcing them with weak passwords. 
  • The attack begins with a scan for potential target web servers running MySQL, Postgres, FTP, or phpMyAdmin.

Network propagation

Developers have added a multiscan module to its source code to scan and find a broader set of potential target machines.
  • At the time of the attack, GoBruteforcer uses a Classless Inter-Domain Routing (CIDR) block for scanning the network. A CIDR is a collection of multiple IP address ranges into a single network and it provides a broader range of targets for infiltration, in comparison to a single IP address.
  • When a host is found, it tries to scan the system to check if any of the ports belonging to the aforementioned services as open and attempts to penetrate that machine via a brute-force attack.

Post-infection activities

  • Upon successful intrusion, GoBruteforcer deploys an IRC bot having the attacker’s URL.
  • It then starts communicating with the C2 server and waits for further commands from the attackers.
  • Simultaneously, for persistence, the IRC bot registers itself inside a cron.

The bottom line

The multiscan module in GoBruteforcer allows its operators to target a wide range of devices across the networks. The best way to avoid threats originating from brute forcers is to change default passwords and implement a strong password policy including 2FA.
Cyware Publisher

Publisher

Cyware