Tech

A cracked malicious version of a Go package lay undetected online for years

Share
Share


  • Someone forked a popular database module and fitted it with malware
  • The malicious fork was then cached and stored indefinitely
  • It was then creatively hidden in plain sight to target Go developers

A software supply chain attack targeting developers on the Go platform was apparently hiding in plain sight for three years to spread malware, experts have warned.

Cybersecurity researchers from Socket Security uncovered and publicly spoke about the campaign, which started back in 2021, when someone took a relatively popular database module called BoltDB on GitHub and forked it. In the fork, they added malicious code, which granted the attacker backdoor access to compromised computers.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
Some AI prompts could cause 50 times more CO₂ emissions than others, researchers find
Tech

Some AI prompts could cause 50 times more CO₂ emissions than others, researchers find

Credit: Sanket Mishra from Pexels No matter which questions we ask an...

Google Gemini’s super-fast Flash-Lite 2.5 model is out now – here’s why you should switch today
Tech

Google Gemini’s super-fast Flash-Lite 2.5 model is out now – here’s why you should switch today

Google’s new Gemini 2.5 Flash-Lite model is its fastest and most cost-efficient...

5 Nintendo Switch 2 settings I recommend changing as soon as you boot your new console up
Tech

5 Nintendo Switch 2 settings I recommend changing as soon as you boot your new console up

There’s nothing quite like the excitement of a new console; feverishly whipping...