Malicious software supply chain attack targeting Go ecosystem

Malicious software supply chain attack targeting Go ecosystem

Researchers with cybersecurity firm Socket have uncovered a sophisticated software supply chain attack affecting the Go programming language ecosystem. The attack involves a malicious package, disguised as a legitimate database module, that allows threat actors to remotely access infected systems.

The malicious package, named ‘github.com/boltdb-go/bolt’, is a typosquatted version of the authentic BoltDB database module (github.com/boltdb/bolt). The malicious variant, version 1.3.1, was published to GitHub in November 2021 and has since been cached indefinitely by the Go Module Mirror service, a repository that serves Go modules.

Once the backdoored package is installed, it grants the attacker remote access to the victim's system, enabling them to execute arbitrary commands. This is one of the first known cases of a malicious actor exploiting the Go Module Mirror’s caching system to persistently distribute malware, the researchers noted.

The attack started with the threat actor uploading a malicious version of the package to GitHub. The attacker modified the Git tags within the source repository to redirect users to a clean version of the module. However, the Go Module Proxy had already cached the malicious version, meaning developers who installed the package would unknowingly receive the backdoored version.

The manipulation of Git tags is what made this attack so difficult to detect, the researchers explained. Git tags, by default, are mutable, meaning that repository owners can change them at will. This allowed the attacker to modify the tag for version 1.3.1, redirecting users to a non-malicious commit, even though the originally cached version in the Go Module Proxy remained compromised.


Back to the list

Latest Posts

Cyber Security Week in Review: May 9, 2025

Cyber Security Week in Review: May 9, 2025

In brief: SAP zero-day exploited by Chinese hackers, SonicWall patches bugs in its SMA appliances, and more.
9 May 2025
Russia-linked Coldriver hackers deploy new espionage malware in targeted attacks

Russia-linked Coldriver hackers deploy new espionage malware in targeted attacks

LOSTKEYS is designed to steal sensitive files, harvest system information, and exfiltrate details about running processes.
8 May 2025
Russia-aligned operation manipulates audio and images to impersonate experts

Russia-aligned operation manipulates audio and images to impersonate experts

The operation primarily focused on undermining NATO support for Ukraine and spreading false narratives to disrupt domestic politics in EU member states.
7 May 2025