TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Linux wiper malware hidden in malicious Go modules on GitHub

22 pointsby elpocko11 days ago

3 comments

rgoulter11 days ago
I&#x27;d suggest the original article makes for better reading. <a href="https:&#x2F;&#x2F;socket.dev&#x2F;blog&#x2F;wget-to-wipeout-malicious-go-modules-fetch-destructive-payload" rel="nofollow">https:&#x2F;&#x2F;socket.dev&#x2F;blog&#x2F;wget-to-wipeout-malicious-go-modules...</a>
评论 #43903928 未加载
pants210 days ago
How does this get executed in practice? To my knowledge, simply go getting a package doesn&#x27;t execute any code, so perhaps this has to run when the user imports the package in a running Go program?
jqpabc12311 days ago
The open source supply chain is obviously highly vulnerable to this sort of attack.<p>Less obvious is the motivation in this particular case. Why destroy someone&#x27;s data with no real gain from it?
评论 #43951978 未加载