Close Menu
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Categories
  • Altcoins (3,094)
  • Analysis (3,222)
  • Bitcoin (3,836)
  • Blockchain (2,157)
  • DeFi (2,623)
  • Ethereum (2,572)
  • Event (118)
  • Exclusive Deep Dive (1)
  • Landscape Ads (2)
  • Market (2,714)
  • Press Releases (12)
  • Reddit (2,524)
  • Regulation (2,461)
  • Security (3,642)
  • Thought Leadership (3)
  • Videos (44)
Hand picked
  • Sources Say the Clarity Act Bill Will Be Released Next Week
  • XRP Price Depends on Senate CLARITY Act – Why This Bill Matters
  • Polygon Crypto active Giugliano Hardfork: what to know?
  • Ethereum (ETH) Could Explode 130% If This “Line in the Sand” Holds: Details
  • Clarity Act Is Really Bad For Crypto Speculators
We are social
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Facebook X (Twitter) Instagram
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
Facebook X (Twitter) Instagram YouTube LinkedIn
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Events
Altcoin ObserverAltcoin Observer
Home»Blockchain»New GoBruteforcer attack wave targets crypto and blockchain projects
Blockchain

New GoBruteforcer attack wave targets crypto and blockchain projects

January 10, 2026No Comments
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


New GoBruteforcer attack wave targets crypto and blockchain projects

A new wave of GoBruteforcer botnet malware attacks targets cryptocurrency and blockchain project databases on exposed servers allegedly configured using AI-generated examples.

GoBrutforcer is also known as GoBrut. It is a Golang-based botnet that typically targets exposed FTP, MySQL, PostgreSQL, and phpMyAdmin services.

The malware often relies on compromised Linux servers to scan random public IP addresses and carry out brute force login attacks.

Ace

Tackle weak defenses

Check Point researchers estimate that there are more than 50,000 Internet servers that could be vulnerable to GoBrut attacks.

They say the initial compromise is often achieved via FTP servers on servers running XAMPP, because the setup often has a weak default password unless the administrator goes through the security setup.

“When attackers gain access to XAMPP FTP using a standard account (usually demon Or person) and a weak default password, the next step is usually to download a web shell into the web root,” Check Point

The attacker can download the web shell through other means, such as a misconfigured MySQL server or a phpMyAdmin panel. The infection chain continues with a downloader, fetching an IRC bot and the bruteforcer module.

Malware activity starts after a delay of 10 to 400 seconds, launching up to 95 brute force threads on x86_64 architectures, scanning random public IP address ranges, while ignoring private networks, AWS cloud ranges, and US government networks.

Each worker generates a single random public IPv4 address, probes the affected service port, goes through the provided list of credentials, and then exits. New workers are constantly generated to maintain the set level of competition.

The FTP module relies on a hard-coded list of 22 username-password pairs embedded directly in the binary. These credentials closely match the default or commonly deployed accounts in web hosting stacks like XAMPP.

Chain of infection
GoBruteforcer infection chain
Source: Checkpoint

Check Point reports that in recent campaigns, GoBruteforcer activity is fueled by the reuse of common server configuration snippets generated by large language models (LLMs), leading to a proliferation of weak and predictable default usernames, such as application user, myuserAnd operator.

These usernames frequently appear in AI-generated Docker and DevOps instructions, leading researchers to believe that the configurations were added to real-world systems, making them vulnerable to password spraying attacks.

The second trend fueling the botnet’s recent campaign is outdated server stacks like XAMPP that continue to ship with default credentials and open FTP services. These deployments expose vulnerable Webroot directories, allowing attackers to remove web shells.

Check Point’s report highlights a campaign in which a compromised host was infected by TRON wallet scanning tools that perform scans on TRON and Binance Smart Chain (BSC). The attackers used a file containing approximately 23,000 TRON addresses, targeting them with automated utilities to identify and empty wallets with non-zero balances.

Administrators defending against GoBruteforcer should avoid using AI-generated deployment guides and rely on non-default usernames with strong, unique passwords.

It is also recommended to check FTP, phpMyAdmin, MySQL and PostgreSQL for exposed services and replace outdated software stacks like XAMPP with more secure alternatives.

Ace

Whether you want to clean up old keys or set guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of managing secrets.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe new BlackRock report exposes a historic shift in crypto that leaves only a single blockchain controlling the settlement layer.
Next Article Reviewing DeFi NEOE DEFI Technologies Narrative After Target Reset and DeFi Alpha Delays

Related Posts

Blockchain

Japanese securities giant to issue $65 million worth of XRP-paying blockchain bonds – DL News

February 23, 2026
Blockchain

What is the .brave Blockchain domain and how it works

February 22, 2026
Blockchain

Why President Trump’s latest crypto scandal could be a disaster for the blockchain industry

February 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Single Page Post
Share
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Featured Content
Event

Global Games Show Riyadh: The Ultimate Creator & Influencer Hub

March 31, 2026

The fast-evolving gaming ecosystem of Riyadh is powered by solid national investment, a flourishing esports…

Event

AI Future: The leading international forum on Artificial Intelligence & Web3

March 30, 2026

On April 14–15, AI Future will gather developers, researchers, entrepreneurs, investors, and representatives of major…

1 2 3 … 81 Next
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Polygon Crypto active Giugliano Hardfork: what to know?

April 7, 2026

Grayscale Increases TAO Exposure from 31% to 43% in Latest Rebalance – Here’s Why

April 7, 2026

Ethereum Rally Leverages $66.9 Billion Flows – Sustainable or Stretched?

April 7, 2026
Facebook X (Twitter) Instagram LinkedIn
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
© 2026 Altcoin Observer. all rights reserved by Tech Team.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 68,096.00
ethereum
Ethereum (ETH) $ 2,076.56
tether
Tether (USDT) $ 0.999851
bnb
BNB (BNB) $ 597.81
xrp
XRP (XRP) $ 1.30
usd-coin
USDC (USDC) $ 0.99991
solana
Solana (SOL) $ 78.78
tron
TRON (TRX) $ 0.313721
figure-heloc
Figure Heloc (FIGR_HELOC) $ 1.02
staked-ether
Lido Staked Ether (STETH) $ 2,265.05