Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    January 26, 2026

    5 Breakthroughs in Graph Neural Networks to Watch in 2026

    January 26, 2026

    Hadrian raises funding for automated manufacturing, bringing valuation to $1.6B

    January 26, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Malicious Go Packages Impersonate Google’s UUID Library to Steal Delicate Information
    AI Ethics & Regulation

    Malicious Go Packages Impersonate Google’s UUID Library to Steal Delicate Information

    Declan MurphyBy Declan MurphyDecember 6, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Malicious Go Packages Impersonate Google’s UUID Library to Steal Delicate Information
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    A hidden hazard has been lurking within the Go programming ecosystem for over 4 years.

    Safety researchers from the Socket Risk Analysis Group have found two malicious software program packages that impersonate well-liked Google instruments.

    These pretend packages, designed to trick busy builders, have been quietly stealing information since Could 2021.

    Socket AI Scanner’s evaluation of the malicious github[.]com/bpoorman/uuid bundle 

    The malicious packages are recognized as github.com/bpoorman/uuid and github.com/bpoorman/uid.

    They’re designed to look virtually equivalent to the reputable and broadly used pborman and Google UUID libraries.

    These actual libraries are the trade commonplace for producing distinctive identifiers for database rows, consumer periods, and job monitoring.

    The “Typosquatting” Lure

    The attacker, utilizing the username “bpoorman,” used a method referred to as “typosquatting.”

    By selecting a reputation visually much like “pborman” (a reputable maintainer), the attacker hoped builders would mistype the identify or miss out on the distinction in an extended record of dependencies.

    page for the malicious github[.]com/bpoorman/uuid Go package
    web page for the malicious github[.]com/bpoorman/uuid Go bundle

    Crucially, the pretend software program truly works. It generates distinctive IDs identical to the actual model. This permits it to remain hidden, as the applying doesn’t crash or present apparent errors. Nonetheless, the pretend code accommodates a secret backdoor.

    The malicious code features a helper perform named Legitimate. Within the reputable software program, builders may anticipate a perform with this identify to test if an ID is formatted accurately. Within the pretend model, it does one thing rather more harmful.

    When a developer passes information into this Legitimate perform equivalent to consumer IDs, electronic mail addresses, and even session tokens the code secretly encrypts that data.

    It then sends the stolen information to dpaste.com, a public text-sharing web site, utilizing a hardcoded API token. The attacker can then retrieve this information anonymously.

    As a result of the info is encrypted earlier than it leaves the sufferer’s pc, commonplace safety instruments won’t discover that delicate secrets and techniques are being stolen.

    Regardless of being printed years in the past, these packages have remained obtainable on the Go bundle discovery website and public mirrors.

    Excerpt from the threat actor’s github[.]com/bpoorman/uid repository showing the uid.go exfiltration code
    Excerpt from the menace actor’s github[.]com/bpoorman/uid repository displaying the uid.go exfiltration code 

    Whereas the general public index reveals “0 imports,” researchers warn that that is deceptive.

    The index doesn’t rely downloads from non-public company repositories or inside instruments, which means the precise variety of affected programs is unknown.

    Socket has reported each packages to the Go safety workforce and requested that the writer’s account be suspended.

    Builders are strongly suggested to audit their tasks and guarantee they’re utilizing github.com/google/uuid or github.com/pborman/uuid, and never the malicious “bpoorman” imposter.

    Comply with us on Google Information, LinkedIn, and X to Get Immediate Updates and Set GBH as a Most well-liked Supply in Google.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Microsoft Open-Sources winapp, a New CLI Instrument for Streamlined Home windows App Growth

    January 26, 2026

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026
    Top Posts

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    January 26, 2026

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    The 5 Varieties Of Organizational Buildings For The New World Of Work

    By Charlotte LiJanuary 26, 2026

    It is a premium article obtainable to paid subscribers solely. Click on right here to subscribe and…

    5 Breakthroughs in Graph Neural Networks to Watch in 2026

    January 26, 2026

    Hadrian raises funding for automated manufacturing, bringing valuation to $1.6B

    January 26, 2026

    Microsoft Open-Sources winapp, a New CLI Instrument for Streamlined Home windows App Growth

    January 26, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.