Check Point Research has identified an active and evolving botnet campaign, dubbed GoBruteforcer (or GoBrut), that targets internet-facing Linux servers. The malware, written in the Go programming language, compromises systems by brute-forcing weak and default credentials for common services, including phpMyAdmin, MySQL, PostgreSQL, and FTP. The campaign is particularly effective due to the prevalence of misconfigured servers and the reuse of weak credentials from online tutorials and AI-generated code snippets. After compromising a server, the attackers enlist it into an IRC-based botnet to expand their operations. The ultimate goal is financial gain; the attackers deploy secondary payloads designed to scan for and steal cryptocurrency from TRON and Binance Smart Chain wallets found on the infected hosts.
GoBruteforcer is a multi-component threat that does not rely on vulnerabilities but on poor security hygiene. The attack lifecycle is as follows:
appuser, etc.) are propagated by AI-generated examples for server deployments.A newer variant of the malware is written entirely in Go and features enhanced obfuscation and process-masking techniques to evade detection.
T1110.001 - Password Guessing and T1110.003 - Password Spraying against exposed database and web administration services.T1071.004 - DNS for its C2 communications over an IRC channel. IRC is a classic C2 protocol for botnets due to its resilience and multi-user communication capabilities.T1036.004 - Masquerade Task or Service) to hide its presence on the infected system.T1657 - Financial Theft, where the attackers steal cryptocurrency assets. This is achieved by deploying specialized tools that perform T1552.001 - Credentials in Files to find wallet keys and then execute transactions.The direct impact is financial loss for any individual or organization whose cryptocurrency wallets are drained. The broader impact includes the operational cost of cleaning and securing the compromised server, potential data breaches if the server hosted sensitive information, and reputational damage. Furthermore, the compromised server contributes to the growth of the botnet, increasing the threat to other internet users. The targeting of cryptocurrency projects and developers is particularly damaging, as they often handle large sums of digital assets and may store private keys insecurely in development environments.
Security teams can hunt for signs of GoBruteforcer compromise:
| Type | Value | Description |
|---|---|---|
log_source |
auth.log / secure |
Monitor for a high volume of failed login attempts for services like FTP, MySQL, PostgreSQL. |
network_traffic_pattern |
Outbound traffic on ports 6660-6669, 7000 |
Common ports used for IRC C2 communications. |
process_name |
Suspicious Go-compiled binaries | Look for newly created, unknown executable files in directories like /tmp or /var/tmp. |
command_line_pattern |
`ps -ef | grep 'kworkerds'` |
file_name |
Files containing TRON/BSC wallet addresses | Presence of files with large lists of crypto addresses could indicate a compromised host is being used for financial attacks. |
6660-6669), unless there is a legitimate business need. This is a key part of D3FEND's Outbound Traffic Filtering (D3-OTF).M1027 - Password Policies.M1035 - Limit Access to Resource Over Network.Enforce strong, unique passwords for all service accounts to prevent brute-force compromise.
Mapped D3FEND Techniques:
Do not expose database or management interfaces to the internet. Restrict access to trusted IPs or require VPN.
Mapped D3FEND Techniques:
Implement account lockout policies to thwart automated brute-force attacks.
Mapped D3FEND Techniques:
Use egress filtering to block suspicious outbound connections, such as traffic over IRC ports.
The GoBruteforcer botnet succeeds entirely because of weak credentials. The single most effective countermeasure is to enforce a strong password policy across all systems, especially for internet-facing services like MySQL, PostgreSQL, and FTP on Linux servers. This policy should mandate a minimum length (e.g., 14 characters), complexity requirements (uppercase, lowercase, numbers, symbols), and a history to prevent password reuse. Crucially, organizations must have a process to audit and eliminate all default passwords (like 'admin', 'root', 'password') from their environments. For service accounts, use long, randomly generated passwords stored in a secure vault. This simple security hygiene measure completely removes the initial access vector used by this botnet, rendering it ineffective.
Beyond strong passwords, organizations must practice network isolation and limit the exposure of sensitive services. There is rarely a valid reason to expose a database management port (like MySQL's 3306 or PostgreSQL's 5432) directly to the public internet. These services should be placed in a private network segment. Access should only be allowed from trusted application servers within the same VPC or via a secure connection like a VPN or an SSH tunnel for administrative purposes. Use cloud security groups or on-premise firewalls to create strict inbound rules that deny all traffic to these ports from the internet (0.0.0.0/0). This 'deny by default' posture dramatically reduces the attack surface, preventing the botnet's scanners from ever discovering the services in the first place.
To actively counter brute-force attempts, implement account locking policies on all exposed services. Configure services like SSH, FTP, and databases to automatically lock an account for a period of time (e.g., 15 minutes) after a small number of consecutive failed login attempts (e.g., 5 failures). This acts as a circuit breaker, making automated, high-speed password guessing attacks like those from GoBruteforcer impractical. The delay imposed by the lockout drastically increases the time required to guess a password, forcing the attacker to move on to an easier target. This is a simple but highly effective way to thwart brute-force initial access.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats