Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
May 14, 2026
Sandworm Targets Critical OT Assets, Pivoting from
May 14, 2026
New Malware Framework: Screen Control, Browser & Enables Artifact
May 14, 2026
Home/CyberSecurity News/GoBruteforcer Botnet Targets Linux FTP, Passwords MySQL
CyberSecurity News

GoBruteforcer Botnet Targets Linux FTP, Passwords MySQL

A sophisticated Go-based botnet, dubbed GoBruteforcer Botnet operates through a modular infection chain consisting of web shells, downloaders, IRC bots, and bruteforcer components. According to Check...

David kimber
David kimber
January 7, 2026 3 Min Read
20 0

A sophisticated Go-based botnet, dubbed GoBruteforcer Botnet operates through a modular infection chain consisting of web shells, downloaders, IRC bots, and bruteforcer components.

According to Check Point’s analysis, more than 50,000 internet-facing servers may be vulnerable to GoBruteforcer attacks, with approximately 5.7 million FTP servers, 2.23 million MySQL servers, and 560,000 PostgreSQL servers currently exposed on their default ports.

GoBruteforcer Reuse of AI-generated Server

The current wave of GoBruteforcer campaigns is driven by two critical factors: the mass reuse of AI-generated server deployment examples that propagate common usernames and weak defaults, and the persistence of legacy web stacks such as XAMPP that expose services with minimal hardening.

Researchers observed that the botnet uses common operational usernames like “appuser” and “myuser” in brute-force credential lists, the same default names frequently suggested by large language models when administrators request database configuration examples.​

User name and password used for Bruteforce (Source: CheckPoint)

Check Point’s investigation revealed that GoBruteforcer credential lists overlap with approximately 2.44% of a database containing 10 million leaked passwords.

While this success rate appears low, the enormous number of exposed services makes brute-force attacks economically attractive for threat actors. Google’s 2024 Cloud Threat Horizons report found that weak or missing credentials accounted for 47.2% of initial access vectors in compromised cloud environments, supporting the viability of this attack method.

The botnet’s C2 server transmits lists of 200 credentials for brute-force tasks, with campaign profiles rotated several times per week.

Password lists are generated from a relatively small database of 375-600 commonly used weak passwords, supplemented with username-flavored variants such as “appuser1234” or “operatoroperator”.

The 2025 variant introduces several significant improvements over earlier versions, first documented in 2023. The IRC bot component has been completely rewritten in Go and heavily obfuscated with Garbler, replacing the previous C-based implementation.

The malware now employs process-masking techniques by calling prctl to change the process name to “init” and overwriting argv buffers to hide command-line arguments from monitoring tools.

Researchers discovered a cryptocurrency-focused campaign where threat actors deployed additional Go-based tools on compromised hosts, including a TRON balance scanner and token-sweep utilities for TRON and Binance Smart Chain.

Infection chain (Source: CheckPoint)

On one compromised server, investigators recovered a file containing approximately 23,000 TRON addresses and confirmed through on-chain transaction analysis that financially motivated attacks had succeeded.​

The botnet maintains resilience through multiple mechanisms: hardcoded fallback C2 addresses, domain-based recovery paths, and the ability to promote infected hosts to serve as distribution nodes or IRC relays.

IRC bot modules can be updated twice daily, with bruteforcer components downloaded via architecture-specific shell scripts that verify MD5 checksums before execution.

GoBruteforcer campaigns demonstrate both broad spray attacks and sector-focused operations. Generic campaigns use common operational usernames combined with standard weak passwords, while specialized runs employ crypto-themed usernames like “cryptouser” and “appcrypto” or WordPress-specific credentials such as “wpuser”.

The malware also specifically targets XAMPP installations, a popular development stack that often ships with default FTP credentials and maps FTP root directories to web-accessible paths.

The botnet’s architecture enables infected hosts to scan approximately 20 IP addresses per second while maintaining low bandwidth consumption roughly 64 kb/s outbound and 32 kb/s inbound during FTP campaigns.

Worker pools are sized based on CPU architecture: 64-bit systems run 95 concurrent brute-force threads, while 32-bit systems run fewer workers.

The malware intelligently filters target selection, excluding private networks, cloud provider spaces, and U.S. Department of Defense IP ranges to avoid detection.

Organizations can mitigate GoBruteforcer risks by implementing strong password policies, disabling unnecessary internet-facing services, enforcing multi-factor authentication, and monitoring for suspicious login attempts.

Type IOC Description / Notes
Network 190.14.37[.]10 C&C (reported active endpoint).​
Network 93.113.25[.]114 C&C (reported active endpoint). ​
Network fi.warmachine[.]su C&C (as provided).
Network xyz.yuzgebhmwu[.]ru C&C (reported active endpoint). ​
Network pool.breakfastidentity[.]ru C&C (as provided).
Network pandaspandas[.]pm C&C (as provided; appears twice in the provided list).
Network my.magicpandas[.]fun C&C (as provided).
File hash (SHA-256) 7423b6424b26c7a32ae2388bc23bef386c30e9a6acad2b63966188cb49c283ad IRC Bot (x86) (as provided).
File hash (SHA-256) 8fd41cb9d73cb68da89b67e9c28228886b8a4a5858c12d5bb1bffb3c4addca7c IRC Bot (x86) (as provided).
File hash (SHA-256) bd219811c81247ae0b6372662da28eab6135ece34716064facd501c45a3f4c0d IRC Bot (arm) (as provided).
File hash (SHA-256) b0c6fe570647fdedd72c920bb40621fdb0c55ed217955557ea7c27544186aeec IRC Bot (arm64) (as provided).
File hash (SHA-256) ab468da7e50e6e73b04b738f636da150d75007f140e468bf75bc95e8592468e5 Bruteforcer (x86) (as provided).
File hash (SHA-256) 4fbea12c44f56d5733494455a0426b25db9f8813992948c5fbb28f38c6367446 Bruteforcer (x64) (as provided).
File hash (SHA-256) 64e02ffb89ae0083f4414ef8a72e6367bf813701b95e3d316e3dfbdb415562c4 Bruteforcer (arm) (as provided).
File hash (SHA-256) c7886535973fd9911f8979355eae5f5abef29a89039c179842385cc574dfa166 Bruteforcer (arm64) (as provided).

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Stolen Data Manipulated to Corrupt AI Models, Researchers Generate

Next Post

From Tycoon2FA to Lazarus Group – Inside ANY.RUN’s Biggest

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Canon MailSuite Flaw Allows Remote Code Execution
May 14, 2026
Anthropic Mythos AI Finds macOS Flaws B Anthropic’s Reportedly
May 14, 2026
Hackers Compromise 170 npm Packages to Steal GitHub
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us