The post Hackers target crypto and blockchain project databases using AI appeared on BitcoinEthereumNews.com. Cryptocurrency and blockchain project databases withThe post Hackers target crypto and blockchain project databases using AI appeared on BitcoinEthereumNews.com. Cryptocurrency and blockchain project databases with

Hackers target crypto and blockchain project databases using AI

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Cryptocurrency and blockchain project databases with weak credentials and AI-generated are being hacked through deployment patterns picked up by botnets, according to new research from Check Point.

A malware botnet named GoBruteforcer is capable of compromising Linux servers and turning them into automated password-cracking nodes, said the cybersecurity company. The hacking program has affected infrastructure used by crypto projects, including database servers, file transfer services, and web administration panels. 

GoBrut can scan the internet for poorly secured services and attempt to log into services using popular usernames and weak passwords. Once a system is compromised, it is then added to a distributed network that can be remotely accessed by a network of hackers.

GoBruteforcer botnet can hack vaguely thought-out passwords

According to Check Point’s report published last Wednesday, the botnet can walk past protections in services like FTP, MySQL, PostgreSQL, and phpMyAdmin. These programs are used by blockchain startups and decentralized app developers to manage user data, application logic, and internal dashboards.

Systems GoBrute has hacked can accept commands from a command-and-control server, dictating which service to attack while supplying credentials for brute-force attempts. The revealed login details are reused to access other systems, steal private data, create hidden accounts, and add to the botnet’s reach.

Check Point also mentioned that infected hosts can also be repurposed to host malicious payloads, distribute malware to new victims, or become backup control servers if the core system is experiencing downtimes.

Many development teams now, including those from big tech firms like Microsoft and Amazon, use code snippets and setup guides generated by large language models (LLMs) or copied from online forums. 

Check Point explained that since AI models cannot create new passwords and usually mimic what they have been taught, they make usernames and default passwords very predictable, not changing them fast enough before systems are exposed to the internet. 

The problem becomes even more dire when legacy web stacks like XAMPP are used, which can expose administrative services by default and provide an easy entry point for hackers.

GoBruteforcer campaigns began in 2023, Unit 42 research found

GoBruteforcer was first documented in March 2023 by Palo Alto Networks’ Unit 42, which detailed its ability to compromise Unix-like systems x86, x64, and ARM architectures. The malware deploys an Internet Relay Chat bot and web shell, which attackers use to keep their remote access.

In September 2025, researchers at Lumen Technologies’ Black Lotus Labs found that a portion of infected machines linked to another malware family, SystemBC, were also GoBruteforcer nodes. Check Point analysts compared the password lists used in attacks against a database of roughly 10 million leaked credentials and found an overlap of about 2.44%.

Based on that overlap, they estimated that tens of thousands of database servers could accept one of the passwords used by the botnet. Google’s 2024 Cloud Threat Horizons report found that weak or missing credentials were responsible for 47.2% of initial access vectors in breached cloud environments.

Blockchain and AI reconnaissance expose private data, research finds

In instances where GoBrute was traced in cryptocurrency environments, network hackers used crypto-themed usernames and password variants that matched naming conventions from blockchain projects. Other campaigns targeted phpMyAdmin panels linked to WordPress sites, a service for project websites and dashboards. 

“Some tasks are clearly sector-focused. For example, we observed an attack that used crypto-themed usernames such as cryptouser, appcrypto, crypto_app, and crypto. In these runs, the passwords used combined the standard weak list with crypto-specific guesses such as cryptouser1 or crypto_user1234,” Check Point said, mentioning examples of passwords.

Check Point identified a compromised server being used to host a module that scanned TRON blockchain addresses and queried balances through a public blockchain API to identify wallets holding funds.

“The combination of exposed infrastructure, weak credentials, and increasingly automated tools. While the botnet itself is technically straightforward, its operators benefit from the number of misconfigured services online,” the security company wrote.

If you’re reading this, you’re already ahead. Stay there with our newsletter.

Source: https://www.cryptopolitan.com/hackers-target-crypto-and-blockchain-project/

Market Opportunity
Sleepless AI Logo
Sleepless AI Price(SLEEPLESSAI)
$0.01866
$0.01866$0.01866
+2.75%
USD
Sleepless AI (SLEEPLESSAI) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Tags:

You May Also Like

Trump’s Hormuz Ultimatum Sends Oil Past $110, Highest Since March

Trump’s Hormuz Ultimatum Sends Oil Past $110, Highest Since March

The post Trump’s Hormuz Ultimatum Sends Oil Past $110, Highest Since March appeared on BitcoinEthereumNews.com. Oil prices extended gains in early Asian trading
Share
BitcoinEthereumNews2026/04/06 09:54
Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued

Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued

The post Foreigner’s Lou Gramm Revisits The Band’s Classic ‘4’ Album, Now Reissued appeared on BitcoinEthereumNews.com. American-based rock band Foreigner performs onstage at the Rosemont Horizon, Rosemont, Illinois, November 8, 1981. Pictured are, from left, Mick Jones, on guitar, and vocalist Lou Gramm. (Photo by Paul Natkin/Getty Images) Getty Images Singer Lou Gramm has a vivid memory of recording the ballad “Waiting for a Girl Like You” at New York City’s Electric Lady Studio for his band Foreigner more than 40 years ago. Gramm was adding his vocals for the track in the control room on the other side of the glass when he noticed a beautiful woman walking through the door. “She sits on the sofa in front of the board,” he says. “She looked at me while I was singing. And every now and then, she had a little smile on her face. I’m not sure what that was, but it was driving me crazy. “And at the end of the song, when I’m singing the ad-libs and stuff like that, she gets up,” he continues. “She gives me a little smile and walks out of the room. And when the song ended, I would look up every now and then to see where Mick [Jones] and Mutt [Lange] were, and they were pushing buttons and turning knobs. They were not aware that she was even in the room. So when the song ended, I said, ‘Guys, who was that woman who walked in? She was beautiful.’ And they looked at each other, and they went, ‘What are you talking about? We didn’t see anything.’ But you know what? I think they put her up to it. Doesn’t that sound more like them?” “Waiting for a Girl Like You” became a massive hit in 1981 for Foreigner off their album 4, which peaked at number one on the Billboard chart for 10 weeks and…
Share
BitcoinEthereumNews2025/09/18 01:26
Iran mediators propose 45-day ceasefire amid low US-Iran resolution odds: FT

Iran mediators propose 45-day ceasefire amid low US-Iran resolution odds: FT

The post Iran mediators propose 45-day ceasefire amid low US-Iran resolution odds: FT appeared on BitcoinEthereumNews.com. Iranian mediators propose a 45-day ceasefire
Share
BitcoinEthereumNews2026/04/06 10:15

$30,000 in PRL + 15,000 USDT

$30,000 in PRL + 15,000 USDT$30,000 in PRL + 15,000 USDT

Deposit & trade PRL to boost your rewards!