jbz<p>⚠️ Linux wiper malware hidden in malicious Go modules on GitHub </p><p>「 The attack appears designed specifically for Linux-based servers and developer environments, as the destructive payload - a Bash script named <a href="https://done.sh" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">done.sh</span><span class="invisible"></span></a>, runs a ‘dd’ command for the file-wiping activity.</p><p>Furthermore, the payload verifies that it runs in a Linux environment (runtime.GOOS == "linux") before trying to execute 」 </p><p><a href="https://www.bleepingcomputer.com/news/security/linux-wiper-malware-hidden-in-malicious-go-modules-on-github/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/linux-wiper-malware-hidden-in-malicious-go-modules-on-github/</span></a> </p><p><a href="https://indieweb.social/tags/golang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>golang</span></a> <a href="https://indieweb.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://indieweb.social/tags/supplychainattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>supplychainattack</span></a></p>