- This ultraportable Asus laptop gives the M4 MacBook Air a run for its money - and it looks great
- I replaced my iPhone 16 Pro with the 16e for a week - here's my buying advice now
- I tested a Windows PC that outdoes the M4 Mac Mini in several ways - and it's on sale
- This portable Bluetooth speaker delivers room-filling sound at an extraordinarily low price
- Want to win in the age of AI? You can either build it or build your business with it
ChaChi, a GoLang Trojan used in ransomware attacks on US schools

A new Trojan written in the Go programming language, tracked as ChaChi, was involved in ransomware attacks against government agencies and US schools.
Researchers from BlackBerry Threat Research and Intelligence spotted a new RAT written in the Go programming language, dubbed ChaChi, which has been used by PYSA (aka Mespinoza) operators to target victims globally.
The name ChaChi comes from two key components of the malware, Chashell and Chisel. Chashell is a reverse shell over DNS provider, while Chisel is a port-forwarding tool. ChaChi has been first observed in the wild in the first half of 2020, but cybersecurity experts underestimated it.
The first variant of the RAT was less sophisticated and poorly obfuscated.
“This is a notable change in operation from earlier notable ransomware campaigns such as NotPetya or WannaCry,” continues the researchers. “These actors are utilizing advanced knowledge of enterprise networking and security misconfigurations to achieve lateral movement and gain access to the victim’s environments.”
The malware was recently employed in attacks against large US schools and education organizations.
The current version of the RAT implements backdoor capabilities, it allows attackers to harvest credentials and harvest credentials. The Trojan leverages the gobfuscate GoLang tool for obfuscation.
“Healthcare and education organizations also host large volumes of sensitive data, making them more valuable targets. It is not uncommon for schools and hospitals to have legacy systems, poor email filtering, no data backups, or unpatched systems in their environments. This leaves their networks more vulnerable to exploits and ransomware attacks.” concludes the report that also includes a detailed analysis along with Indicators of Compromise (IoCs) and Yara Rules for the detection.
“It is particularly concerning that attackers are focusing so heavily on education organizations, as they are especially vulnerable.”
Follow me on Twitter: @securityaffairs and Facebook
Pierluigi Paganini
International Editor-in-Chief
Cyber Defense Magazine