Go Malware is Now Common, Having Been Adopted by Both APTs and E-crime Groups
The number of malware strains coded in the Go programming language has seen a sharp increase of around 2,000% over the last few years, since 2017, cybersecurity firm Intezer said in a report published recently. From a report: The company's findings highlight and confirm a general trend in the malware ecosystem, where malware authors have slowly moved away from C and C++ to Go, a programming language developed and launched by Google in 2007. While the first Go-based malware was detected in 2012, it took, however, a few years for Golang to catch on with the malware scene. "Before 2019, spotting malware written in Go was more a rare occurrence and during 2019 it became a daily occurrence," Intezer said in its report. But in the new report, Golang (as it's often also referred to instead of Go) has broken through and has been widely adopted. It is used by nation-state hacking groups (also known as APTs), cybercrime operators, and even security teams alike, who often used it to create penetration-testing toolkits.
from Slashdot https://ift.tt/3dYd3Qk
Read more of this story at Slashdot.
from Slashdot https://ift.tt/3dYd3Qk
0 Response to "Go Malware is Now Common, Having Been Adopted by Both APTs and E-crime Groups"
Post a Comment