Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot

![SSH Brute-Force Tool](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_MS2EnkJx0smfkh9jPgVCwzAVD9zpIkpEoYP8Z30l20DYhHW2USZrRxJeP56Q62VenfhR02Iq0QO3wH12F-n2YjipfM5yHArlYlRiimnghudGACbXklxwbxAO-TDWHD_9rG4cXDlK7VpHNUf8MWejLdNn6th5n17jPbzPCoy5pzJjQ7tATwsTR-PgI1AU/s728-rw-e365/ssh-tool.jpg ‘SSH Brute-Force Tool’)Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH but actually contains functionality to discreetly exfiltrate credentials to its creator.’On the first successful login, the package sends the target IP address, username, and password to a hard-coded Telegram bot controlled by the threat actor,’ Socket researcher Kirill Boychenko [said](https://socket.dev/blog/malicious-go-module-disguised-as-ssh-brute-forcer-exfiltrates-credentials).The deceptive package, named ‘golang-random-ip-ssh-bruteforce,’ has been linked to a GitHub account called [IllDieAnyway](https://github.com/illdieanyway) (G3TT), which is currently no longer accessible. However, it [continues to be available](https://pkg.go.dev/github.com/illdieanyway/golang-random-ip-ssh-bruteforce@v0.0.0-20220624110449-9d819518d4fc#) on pkg.go-[.-]dev. It was published on June 24, 2022.The software supply chain security company said the Go module works by scanning random IPv4 addresses for exposed SSH services on TCP port 22, then attempting to brute-force the service using an embedded username-password list and exfiltrating the successful credentials to the attacker.A notable aspect of the malware is that it deliberately disables host key verification by setting ‘[ssh.InsecureIgnoreHostKey](https://pkg.go.dev/golang.org/x/crypto/ssh#InsecureIgnoreHostKey)’ as a HostKeyCallback, thereby allowing the SSH client to accept connections from any server regardless of their identity.The wordlist is fairly straightforward, including only two usernames root and admin, and pairing them against weak passwords like root, test, password, admin, 12345678, 1234, qwerty, webadmin, webmaster, techsupport, letmein, and Passw@rd. ![Identity Security Risk Assessment](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHQ0O8BgniCymqcfT9uXxTxwemhONtmR9Aib7y_v5o2XkJyEdvnHCDsEu3vM_HF-RS3j2KH0vUHA1ACHCrSPugj8IMIKLkKs8_0WRoy36XEOSQeDy6SzhAGrsyH5KTum7JePSUpeZXFtNV6_jCogmTbhPvIu5kn7VIIQ2lWO96y5S5kGGCcwOV_szFG59Y/s728-e100/cant-see-d.jpg)The malicious code runs in an infinite loop to generate the IPv4 addresses, with the package attempting concurrent SSH logins from the wordlist.The details are transmitted to a threat actor-controlled Telegram bot named ‘@sshZXC_bot’ (ssh_bot) via the API, which then acknowledges the receipt of the credentials. The messages are sent through the bot to an account with the handle ‘@io_ping’ (Gett). ![SSH Brute-Force Tool](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdPvGfOX4Abfle8aEVfLZ-G7TJQHUy3vBXXY7Fdzc4RcOQtzQ4SrOX1WsubqvWXvCKm1sX4I-xMaUYtorMM5V7lqQ34Mt5kCPcYt6PexwbS3xkZ-UESQ2Yozm1lrIe5RQ0U7OTpUFfoQGDH2ioaji0KL_0GYOWz-CdVnIITNSKVyC592YQTwAwfiBufuQu/s728-rw-e365/g3tt.jpg ‘SSH Brute-Force Tool’)An [Internet Archive snapshot](https://web.archive.org/web/20250609090051/https://github.com/illdieanyway) of the now-removed GitHub account shows that IllDieAnyway, aka G3TT’s software portfolio, included an IP port scanner, an Instagram profile info and media parser, and even a PHP-based command-and-control (C2) botnet called Selica-C2.Their [YouTube channel](https://www.youtube.com/@AngelsTogether/videos), which remains accessible, hosts various short-form videos on ‘How to hack a Telegram bot’ and what they claim to be the ‘most powerful SMS bomber for the Russian Federation,’ which can send spam SMS texts and messages to VK users using a Telegram bot. It’s assessed that the threat actor is of Russian origin.’The package offloads scanning and password guessing to unwitting operators, spreads risk across their IPs, and funnels the successes to a single threat actor-controlled Telegram bot,’ Boychenko said.’It disables host key verification, drives high concurrency, and exits after the first valid login to prioritize quick capture. Because the Telegram Bot API uses HTTPS, the traffic looks like normal web requests and can slip past coarse egress controls.’ Found this article interesting? Follow us on [Google News](https://news.google.com/publications/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ), [Twitter](https://twitter.com/thehackersnews) and [LinkedIn](https://www.linkedin.com/company/thehackernews/) to read more exclusive content we post.

Related Tags:
NAICS: 517 – Telecommunications

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 51 – Information

Blog: The Hacker News

Masquerading: Match Legitimate Resource Name or Location

Masquerading

Associated Indicators: