Close Menu
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
What's Hot

Bitcoin might be at risk from a new quantum math trick that breaks digital ownership

April 25, 2026

Crypto is legal in Russia now, but not free to use – Why?

April 25, 2026

HERE and KOTEI partner to build AI‑native navigation for the software‑defined vehicle era

April 25, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
CryptoPulseDaily.com
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
CryptoPulseDaily.com
Home»Security and Privacy»GoBruteforcer Botnet Targets Linux Servers
GoBruteforcer Botnet Targets Linux Servers
Security and Privacy

GoBruteforcer Botnet Targets Linux Servers

January 8, 2026No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

A botnet known as GoBruteforcer has been actively targeting Linux servers exposed to the internet, using large-scale brute-force attacks against common services such as FTP, MySQL, PostgreSQL and phpMyAdmin.

In a new advisory published on Wednesday, Check Point Research (CPR) estimated that more than 50,000 publicly accessible servers could be vulnerable due to weak credentials and misconfigured software.

GoBruteforcer turns compromised machines into scanning and attack nodes. Once infected, these servers are used to probe random IP ranges and attempt logins with common usernames and passwords. Successful compromises can lead to data theft, creation of backdoors, resale of access or further spread of the botnet.

The malware was first publicly documented in 2023, but researchers began observing a more capable variant in mid-2025. The newer version is entirely written in Go and introduces heavier obfuscation, stronger persistence and techniques designed to disguise malicious processes on infected hosts.

Attack Scale and Targeting

The current wave of activity is being driven by two converging trends: the mass reuse of standard deployment examples that rely on predictable usernames and weak defaults, and the continued use of legacy web stacks, such as XAMPP, which often expose FTP services and admin panels with minimal security hardening.

Read more on Linux server security: Critical Linux Flaws Discovered Allowing Root Access Exploits

CPR researchers noted that the attackers do not rely on zero-day exploits. Instead, they repeatedly test simple credentials like admin, password or common operational usernames that have circulated for years in documentation and tutorials.

Millions of databases and FTP servers remain reachable on default ports, creating a broad attack surface. Even with a low success rate, the sheer number of exposed systems makes brute-force attacks economically attractive.

See also  South Korea targets ‘problematic’ crypto tax as stablecoin skeptic nears BOK role

GoBruteforcer campaigns rotate several times a week and vary in focus. Some runs spray common usernames across random IP addresses, while others are more targeted. Observed attacks have included crypto-themed usernames aimed at blockchain-related databases, as well as phpMyAdmin panels commonly associated with WordPress sites.

Financial Motives and Crypto Activity

On one compromised server, analysts recovered Go-based tools designed to scan TRON balances and sweep tokens on TRON and Binance Smart Chain. A file containing around 23,000 TRON addresses was also found alongside the botnet components.

On-chain analysis of attacker-controlled wallets indicated that at least some of these financially motivated attacks were successful, although most affected addresses appeared to hold only small residual balances.

Still, the findings highlight a persistent security problem. Exposed services, weak credentials and default configurations continue to provide attackers with reliable access. 

“As generative AI further lowers the barrier to server deployment, the risk of insecure defaults will likely increase,” CPR explained.

“Addressing this class of threats requires not only detection and takedown efforts, but also renewed attention to secure configuration practices, credential hygiene and continuous exposure management.”

Source link

Botnet GoBruteforcer Linux Servers Targets
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

For 93 minutes, installing Bitwarden’s ‘official’ CLI turned laptops into launchpads for hijacking GitHub accounts

April 24, 2026

Npm Supply Chain Attack Uses Worm-Like Propagation

April 24, 2026

Bitcoin Price Strengthens, Fresh Upside Targets Come Into View

April 24, 2026

New York targets crypto with new $3.4B fines as perpetual futures turn prediction apps into nonstop leverage casinos

April 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Jihan Wu’s Bitcoin mining firm Bitdeer partners with NVIDIA

November 10, 2023

Ethereum (ETH) Almost Clears Validator Queue for First Time Since Shapella Upgrade

October 12, 2023

Aptos in a downtrend, but this indicator showed a reversal was possible

May 20, 2023

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Crypto, ICOs, Web3, Blockchain and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Bitcoin might be at risk from a new quantum math trick that breaks digital ownership

April 25, 2026

Crypto is legal in Russia now, but not free to use – Why?

April 25, 2026

HERE and KOTEI partner to build AI‑native navigation for the software‑defined vehicle era

April 25, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Crypto Pulse Daily - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Cleantalk Pixel
  • bitcoinBitcoin(BTC)$77,661.00-0.83%
  • ethereumEthereum(ETH)$2,314.81-0.71%
  • tetherTether(USDT)$1.000.00%
  • rippleXRP(XRP)$1.43-0.52%
  • binancecoinBNB(BNB)$636.12-0.39%
  • usd-coinUSDC(USDC)$1.000.01%
  • solanaSolana(SOL)$86.420.25%
  • tronTRON(TRX)$0.322791-1.56%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.03-0.55%
  • dogecoinDogecoin(DOGE)$0.098151-0.23%