{"id":9503,"date":"2025-12-07T13:44:17","date_gmt":"2025-12-07T13:44:17","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=9503"},"modified":"2025-12-07T13:44:17","modified_gmt":"2025-12-07T13:44:17","slug":"malicious-go-packages-impersonate-googles-uuid-library-to-steal-delicate-information","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=9503","title":{"rendered":"Malicious Go Packages Impersonate Google\u2019s UUID Library to Steal Delicate Information"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>A hidden hazard has been lurking within the Go programming ecosystem for over 4 years. <\/p>\n<p>Safety researchers from the Socket Menace Analysis Crew have found two malicious software program packages that impersonate fashionable <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/facebook-and-google-ads\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google instruments<\/a>. <\/p>\n<p>These faux packages, designed to trick busy builders, have been quietly stealing knowledge since Might 2021.<\/p>\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"622\" height=\"604\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-26.png\" alt=\"Socket AI Scanner\u2019s analysis of the malicious\u00a0github[.]com\/bpoorman\/uuid\u00a0package\u00a0\" class=\"wp-image-171380\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-26.png 622w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-26-300x291.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-26-433x420.png 433w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-26-150x146.png 150w\" sizes=\"(max-width: 622px) 100vw, 622px\"\/><figcaption class=\"wp-element-caption\"><em>Socket AI Scanner\u2019s evaluation of the malicious\u00a0<\/em>github[.]com\/bpoorman\/uuid<em>\u00a0bundle\u00a0<\/em><\/figcaption><\/figure>\n<p>The malicious packages are recognized as\u00a0github.com\/bpoorman\/uuid\u00a0and\u00a0github.com\/bpoorman\/uid. <\/p>\n<p>They&#8217;re designed to look nearly an identical to the legit and broadly used\u00a0pborman\u00a0and\u00a0Google\u00a0UUID libraries. <\/p>\n<p>These actual libraries are the trade customary for producing distinctive identifiers for database rows, person periods, and job monitoring.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-the-typosquatting-trap\"><strong>The \u201cTyposquatting\u201d Lure<\/strong><\/h2>\n<p>The attacker, utilizing the username \u201cbpoorman,\u201d used a method known as \u201c<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/active-phishing-kits\/\" target=\"_blank\" rel=\"noreferrer noopener\">typosquatting<\/a>.\u201d <\/p>\n<p>By selecting a reputation visually much like \u201cpborman\u201d (a legit maintainer), the attacker hoped builders would mistype the identify or fail to see the distinction in a protracted listing of dependencies.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"458\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-27-1024x458.png\" alt=\"page for the malicious github[.]com\/bpoorman\/uuid Go package\" class=\"wp-image-171381\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-27-1024x458.png 1024w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-27-300x134.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-27-768x343.png 768w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-27-1536x686.png 1536w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-27-940x420.png 940w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-27-150x67.png 150w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-27-696x311.png 696w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-27-1068x477.png 1068w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-27.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><figcaption class=\"wp-element-caption\"><em>web page for the malicious\u00a0<\/em><code>github[.]com\/bpoorman\/uuid<\/code><em>\u00a0Go bundle<\/em><\/figcaption><\/figure>\n<p>Crucially, the faux software program really works. It generates distinctive IDs similar to the true model. This enables it to remain hidden, as the applying doesn&#8217;t crash or present apparent errors. Nonetheless, the faux code comprises a secret <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/ssh-tor-backdoor\/\" target=\"_blank\" rel=\"noreferrer noopener\">backdoor<\/a>.<\/p>\n<p>The malicious code features a helper operate named\u00a0Legitimate. Within the legit software program, builders may count on a operate with this identify to verify if an ID is formatted accurately. Within the faux model, it does one thing rather more harmful.<\/p>\n<p>When a developer passes knowledge into this\u00a0Legitimate\u00a0operate equivalent to person IDs, electronic mail addresses, and even session tokens the code secretly encrypts that info. <\/p>\n<p>It then sends the stolen knowledge to\u00a0dpaste.com, a public text-sharing web site, utilizing a hardcoded API token. The attacker can then retrieve this knowledge anonymously. <\/p>\n<p>As a result of the information is encrypted earlier than it leaves the sufferer\u2019s laptop, customary safety instruments may not discover that delicate secrets and techniques are being stolen.<\/p>\n<p>Regardless of being revealed years in the past, these packages have remained out there on the Go bundle discovery website and public mirrors. <\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"580\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-28-1024x580.png\" alt=\"Excerpt from the threat actor\u2019s github[.]com\/bpoorman\/uid repository showing the uid.go exfiltration code \" class=\"wp-image-171382\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-28-1024x580.png 1024w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-28-300x170.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-28-768x435.png 768w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-28-1536x870.png 1536w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-28-742x420.png 742w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-28-150x85.png 150w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-28-696x394.png 696w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-28-1068x605.png 1068w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/12\/image-28.png 1584w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><figcaption class=\"wp-element-caption\"><em>Excerpt from the menace actor\u2019s\u00a0<code>github[.]com\/bpoorman\/uid<\/code>\u00a0repository displaying the\u00a0<code>uid.go<\/code>\u00a0exfiltration code\u00a0<\/em><\/figcaption><\/figure>\n<p>Whereas the general public index reveals \u201c0 imports,\u201d researchers warn that that is deceptive. <\/p>\n<p>The index doesn&#8217;t rely downloads from personal company repositories or inner instruments, that means the precise variety of affected techniques is unknown.<\/p>\n<p>Socket has <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/socket.dev\/blog\/malicious-go-packages-impersonate-googles-uuid-library-and-exfiltrate-data\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reported <\/a>each packages to the Go safety staff and requested that the writer\u2019s account be suspended. <\/p>\n<p>Builders are strongly suggested to audit their tasks and guarantee they&#8217;re utilizing\u00a0github.com\/google\/uuid\u00a0or\u00a0github.com\/pborman\/uuid, and never the malicious \u201cbpoorman\u201d imposter.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong>Observe us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cyber-threat-intel\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>, and\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Instantaneous Updates and Set GBH as a Most popular Supply in\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.google.com\/preferences\/source?q=https:\/\/gbhackers.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google<\/a>.<\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>A hidden hazard has been lurking within the Go programming ecosystem for over 4 years. Safety researchers from the Socket Menace Analysis Crew have found two malicious software program packages that impersonate fashionable Google instruments. These faux packages, designed to trick busy builders, have been quietly stealing knowledge since Might 2021. Socket AI Scanner\u2019s evaluation [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9505,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[157,1184,6801,3424,1166,2987,3110,1443,6802],"class_list":["post-9503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-data","tag-googles","tag-impersonate","tag-library","tag-malicious","tag-packages","tag-sensitive","tag-steal","tag-uuid"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/9503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9503"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/9503\/revisions"}],"predecessor-version":[{"id":9504,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/9503\/revisions\/9504"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/9505"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 16:32:39 UTC -->