In a recent discovery, cybersecurity researchers have unearthed a malicious Go module masquerading as an SSH brute-force tool but in reality, it exfiltrates credentials to its creator. This deceptive package, named “golang-random-ip-ssh-bruteforce,” was linked to a GitHub account named IllDieAnyway (G3TT), which is currently inaccessible. Despite this, the module remains available on pkg.go[.]dev after being published on June 24, 2022. The module functions by scanning random IPv4 addresses for exposed SSH services on TCP port 22, attempting to brute-force using a pre-loaded username-password list, and then sending successful credentials to the attacker.
One notable feature of this malware is its intentional disabling of host key verification by setting “ssh.InsecureIgnoreHostKey” as a HostKeyCallback. This allows the SSH client to accept connections from any server without verifying their identity. The wordlist used by the module consists of basic usernames like root and admin paired with weak passwords commonly used by individuals. The malicious code runs in a loop to generate IPv4 addresses and executes concurrent SSH logins from the wordlist.
The exfiltrated details are transmitted to a Telegram bot controlled by the threat actor, named “@sshZXC_bot” (ssh_bot), which then forwards the information to an account with the handle “@io_ping” (Gett). An Internet Archive snapshot of the IllDieAnyway GitHub account revealed a portfolio of various tools, including an IP port scanner, an Instagram parser, and a PHP-based command-and-control (C2) botnet named Selica-C2. The threat actor behind this malicious activity is believed to be of Russian origin, as indicated by their YouTube channel content on hacking Telegram bots and spamming VK users.
The researchers noted that this package offloads scanning and password guessing to unwitting operators, diversifies risk across multiple IPs, and channels successful logins to a single Telegram bot controlled by the threat actor. By prioritizing quick capture of credentials, disabling host key verification, and using HTTPS to communicate with the bot, the module can bypass standard egress controls due to the traffic resembling regular web requests. This discovery sheds light on the evolving tactics used by threat actors in the realm of cybersecurity and highlights the importance of vigilance in protecting sensitive information.
Source link
