Close Menu
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Categories
  • Altcoins (2,931)
  • Analysis (3,068)
  • Bitcoin (3,678)
  • Blockchain (2,157)
  • DeFi (2,619)
  • Ethereum (2,491)
  • Event (110)
  • Exclusive Deep Dive (1)
  • Landscape Ads (2)
  • Market (2,714)
  • Press Releases (11)
  • Reddit (2,360)
  • Regulation (2,461)
  • Security (3,537)
  • Thought Leadership (3)
  • Uncategorized (2)
  • Videos (43)
Hand picked
  • The Lobstar Wilde $450K loss wasn’t a “decimal error.” It was a memory failure that affects every AI agent with a wallet.
  • Payward partners with Nasdaq to develop xStocks-powered gateway connecting permissioned and permissionless tokenized equity markets
  • Hyperliquid jumps following improved margins and a 533% increase in oil trade
  • GENIUS Act turns stablecoins into tools of dollar domination, not crypto rebels
  • Markets Rebound as Trump Signals Possible Quick End to Iran Conflict
We are social
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Facebook X (Twitter) Instagram
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
Facebook X (Twitter) Instagram YouTube LinkedIn
Altcoin ObserverAltcoin Observer
  • Regulation
  • Bitcoin
  • Altcoins
  • Market
  • Analysis
  • DeFi
  • Security
  • Ethereum
Events
Altcoin ObserverAltcoin Observer
Home»Blockchain»New GoBruteforcer attack wave targets crypto and blockchain projects
Blockchain

New GoBruteforcer attack wave targets crypto and blockchain projects

January 10, 2026No Comments
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


New GoBruteforcer attack wave targets crypto and blockchain projects

A new wave of GoBruteforcer botnet malware attacks targets cryptocurrency and blockchain project databases on exposed servers allegedly configured using AI-generated examples.

GoBrutforcer is also known as GoBrut. It is a Golang-based botnet that typically targets exposed FTP, MySQL, PostgreSQL, and phpMyAdmin services.

The malware often relies on compromised Linux servers to scan random public IP addresses and carry out brute force login attacks.

Ace

Tackle weak defenses

Check Point researchers estimate that there are more than 50,000 Internet servers that could be vulnerable to GoBrut attacks.

They say the initial compromise is often achieved via FTP servers on servers running XAMPP, because the setup often has a weak default password unless the administrator goes through the security setup.

“When attackers gain access to XAMPP FTP using a standard account (usually demon Or person) and a weak default password, the next step is usually to download a web shell into the web root,” Check Point

The attacker can download the web shell through other means, such as a misconfigured MySQL server or a phpMyAdmin panel. The infection chain continues with a downloader, fetching an IRC bot and the bruteforcer module.

Malware activity starts after a delay of 10 to 400 seconds, launching up to 95 brute force threads on x86_64 architectures, scanning random public IP address ranges, while ignoring private networks, AWS cloud ranges, and US government networks.

Each worker generates a single random public IPv4 address, probes the affected service port, goes through the provided list of credentials, and then exits. New workers are constantly generated to maintain the set level of competition.

The FTP module relies on a hard-coded list of 22 username-password pairs embedded directly in the binary. These credentials closely match the default or commonly deployed accounts in web hosting stacks like XAMPP.

Chain of infection
GoBruteforcer infection chain
Source: Checkpoint

Check Point reports that in recent campaigns, GoBruteforcer activity is fueled by the reuse of common server configuration snippets generated by large language models (LLMs), leading to a proliferation of weak and predictable default usernames, such as application user, myuserAnd operator.

These usernames frequently appear in AI-generated Docker and DevOps instructions, leading researchers to believe that the configurations were added to real-world systems, making them vulnerable to password spraying attacks.

The second trend fueling the botnet’s recent campaign is outdated server stacks like XAMPP that continue to ship with default credentials and open FTP services. These deployments expose vulnerable Webroot directories, allowing attackers to remove web shells.

Check Point’s report highlights a campaign in which a compromised host was infected by TRON wallet scanning tools that perform scans on TRON and Binance Smart Chain (BSC). The attackers used a file containing approximately 23,000 TRON addresses, targeting them with automated utilities to identify and empty wallets with non-zero balances.

Administrators defending against GoBruteforcer should avoid using AI-generated deployment guides and rely on non-default usernames with strong, unique passwords.

It is also recommended to check FTP, phpMyAdmin, MySQL and PostgreSQL for exposed services and replace outdated software stacks like XAMPP with more secure alternatives.

Ace

Whether you want to clean up old keys or set guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of managing secrets.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe new BlackRock report exposes a historic shift in crypto that leaves only a single blockchain controlling the settlement layer.
Next Article Reviewing DeFi NEOE DEFI Technologies Narrative After Target Reset and DeFi Alpha Delays

Related Posts

Blockchain

Japanese securities giant to issue $65 million worth of XRP-paying blockchain bonds – DL News

February 23, 2026
Blockchain

What is the .brave Blockchain domain and how it works

February 22, 2026
Blockchain

Why President Trump’s latest crypto scandal could be a disaster for the blockchain industry

February 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Single Page Post
Share
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Featured Content
Event

HIPTHER Baltics Launches in Vilnius with Agenda Revealing Lithuania’s 2026 Regulatory Reset

March 10, 2026

Vilnius, Lithuania — HIPTHER officially announces the agenda for HIPTHER Baltics: Vilnius 2026, the inaugural event of its…

Event

UAE Institutional Leaders Gather in Abu Dhabi as Digital Asset Strategy Accelerates Across the Gulf

March 9, 2026

Abu Dhabi, United Arab Emirates— Senior leaders from global finance, digital asset infrastructure, and regulatory institutions…

1 2 3 … 77 Next
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Hyperliquid jumps following improved margins and a 533% increase in oil trade

March 11, 2026

ZCash Rises Following Funding News, But ZEC Traders Shouldn’t Buy Yet – Here’s Why!

March 10, 2026

XRP Traders Face $50 Billion in Unrealized Losses as Price Falls Below $1.40

March 10, 2026
Facebook X (Twitter) Instagram LinkedIn
  • About us
  • Disclaimer
  • Terms of service
  • Privacy policy
  • Contact us
© 2026 Altcoin Observer. all rights reserved by Tech Team.

Type above and press Enter to search. Press Esc to cancel.

bitcoin
Bitcoin (BTC) $ 69,575.00
ethereum
Ethereum (ETH) $ 2,020.82
tether
Tether (USDT) $ 1.00
bnb
BNB (BNB) $ 639.97
xrp
XRP (XRP) $ 1.38
usd-coin
USDC (USDC) $ 0.999956
solana
Solana (SOL) $ 85.57
tron
TRON (TRX) $ 0.286711
figure-heloc
Figure Heloc (FIGR_HELOC) $ 1.04
staked-ether
Lido Staked Ether (STETH) $ 2,265.05