A cracked malicious version of a Go package was not detected online for years


  • Someone spent a popular database module and equipped it with malware
  • The malicious fork was then chatted and stored indefinitely
  • He was then creatively hidden at the sight of targeting Go Go developers

A software supply chain attack targeting developers on the GO platform apparently hidden for three years to spread malware, experts warned.

Socket Security cybersecurity researchers discovered and spoke publicly the campaign, which started in 2021, when someone took a relatively popular database module called Boltdb on Github and stuffed it. In the fork, they added malicious code, which granted access to the door stolen to the attacker to compromise compromises.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top