SSHStalker botnet uses IRC to target Linux servers

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

The SSHStalker botnet has emerged as a threat to Linux servers, particularly those in cloud environments. According to TechRadar, this malware leverages the Internet Relay Chat (IRC) protocol, a technology dating back decades, to coordinate its activities and reduce operational expenses.

SSHStalker initiates infections via automated scans that identify vulnerable Linux servers. Once access is gained, it deploys cron jobs to schedule tasks and maintain persistence. The botnet's command-and-control structure relies on IRC channels, allowing operators to issue commands efficiently without modern, more detectable infrastructure.

This approach highlights a return to basic networking tools in cybercrime, exploiting the familiarity and low cost of IRC. TechRadar's coverage, published on February 14, 2026, describes how SSHStalker aims to generate profit, likely through cryptocurrency mining or other illicit means on compromised cloud resources.

Security experts note that such botnets underscore the ongoing risks to unsecured servers, but specific details on the scale of infections or affected regions remain undisclosed in the report.

संबंधित लेख

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
AI द्वारा उत्पन्न छवि

Researchers discover SSHStalker botnet infecting Linux servers

AI द्वारा रिपोर्ट किया गया AI द्वारा उत्पन्न छवि

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

AI द्वारा रिपोर्ट किया गया

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

Researchers at Check Point have revealed that VoidLink, a sophisticated Linux malware targeting cloud servers, was largely built by a single developer using AI tools. The framework, which includes over 30 modular plugins for long-term system access, reached 88,000 lines of code in under a week despite plans suggesting a 20-30 week timeline. This development highlights AI's potential to accelerate advanced malware creation.

AI द्वारा रिपोर्ट किया गया

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

OpenClaw, an open-source AI project formerly known as Moltbot and Clawdbot, has surged to over 100,000 GitHub stars in less than a week. This execution engine enables AI agents to perform actions like sending emails and managing calendars on users' behalf within chat interfaces. Its rise highlights potential to simplify crypto usability while raising security concerns.

AI द्वारा रिपोर्ट किया गया

North Korean hackers have begun exploiting a critical vulnerability known as React2Shell in malware attacks. This follows similar actions by Chinese hackers, indicating a growing interest in this security flaw. The issue poses significant risks to affected systems.

 

 

 

यह वेबसाइट कुकीज़ का उपयोग करती है

हम अपनी साइट को बेहतर बनाने के लिए विश्लेषण के लिए कुकीज़ का उपयोग करते हैं। अधिक जानकारी के लिए हमारी गोपनीयता नीति पढ़ें।
अस्वीकार करें