Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

Mar 05, 2025Ravie LakshmananOpen Source / Malware

Malware on Linux and macOS Systems

Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems.

“The threat actor has published at least seven packages impersonating widely used Go libraries, including one (github[.]com/shallowmulti/hypert) that appears to target financial-sector developers,” Socket researcher Kirill Boychenko said in a new report.

“These packages share repeated malicious filenames and consistent obfuscation techniques, suggesting a coordinated threat actor capable of pivoting rapidly.”

Cybersecurity

While all of them continue to be available on the official package repository, their corresponding GitHub repositories barring “github[.]com/ornatedoctrin/layout” are no longer accessible. The list of offending Go packages is below –

  • shallowmulti/hypert (github.com/shallowmulti/hypert)
  • shadowybulk/hypert (github.com/shadowybulk/hypert)
  • belatedplanet/hypert (github.com/belatedplanet/hypert)
  • thankfulmai/hypert (github.com/thankfulmai/hypert)
  • vainreboot/layout (github.com/vainreboot/layout)
  • ornatedoctrin/layout (github.com/ornatedoctrin/layout)
  • utilizedsun/layout (github.com/utilizedsun/layout)
Seven Malicious Go Packages Found

The counterfeit packages, Socket’s analysis found, contain code to achieve remote code execution. This is achieved by running an obfuscated shell command to retrieve and run a script hosted on a remote server (“alturastreet[.]icu”). In a likely effort to evade detection, the remote script is not fetched until an hour has elapsed.

The end goal of the attack is to install and run an executable file that can potentially steal data or credentials.

Cybersecurity

The disclosure arrived a month after Socket revealed another instance of a software supply chain attack targeting the Go ecosystem via a malicious package capable of granting the adversary remote access to infected systems.

“The repeated use of identical filenames, array-based string obfuscation, and delayed execution tactics strongly suggests a coordinated adversary who plans to persist and adapt,” Boychenko noted.

“The discovery of multiple malicious hypert and layout packages, along with multiple fallback domains, points to an infrastructure designed for longevity, enabling the threat actor to pivot whenever a domain or repository is blacklisted or removed.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use