A cracked malicious version of a Go -Pack puts undetected online for years


  • Someone forked a popular database module and mounted it with malware
  • The malicious fork then became cache and stored indefinitely
  • It then was creatively hidden in sight to target go -developers

A software supply chain attack that targeted developers on the GO platform apparently hid in clear vision for three years to spread malware, experts have warned.

CyberSecurity scientists from Socket Security revealed and talked publicly about the campaign that started back in 2021 when someone took a relatively popular database module called Boltdb on GitHub and gaffing it. In the fork, they added malicious code that gave the striker back door access to compromised computers.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top