Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Image generated by AI

Researchers discover SSHStalker botnet infecting Linux servers

Image generated by AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

In early 2026, Flare researchers deployed an SSH honeypot with weak credentials and observed unusual intrusions over two months. After reviewing threat intelligence databases, vendor reports, and malware repositories, they confirmed the activity as previously undocumented and named it SSHStalker. The botnet combines 2009-era IRC botnet tactics with automated mass-compromise techniques, infecting systems via SSH brute-force attacks and scanning.

SSHStalker breaks into Linux servers by guessing weak or reused passwords, then deploys a multi-stage payload. Attackers drop a Golang binary disguised as "nmap" to probe port 22 for new targets, download GCC to compile C files on the host, and unpack archives like GS and bootbou.tgz containing IRC bots written in C and Perl, along with known malware families such as Tsunami and Keiten. The toolkit includes log cleaners that target shell history and records like utmp, wtmp, and lastlog, as well as rootkit-like artifacts and exploits for Linux 2.6.x kernels from 2009-2010 CVEs.

Once installed, the botnet establishes persistence through cron jobs that run every minute to restart processes if disrupted, often restoring control within 60 seconds. Analysis of staging servers revealed nearly 7,000 freshly compromised systems in January 2026, primarily cloud servers linked to Oracle Cloud infrastructure across global regions.

"We’ve designated this operation 'SSHStalker' due to its distinctive behavior: the botnet maintained persistent access without executing any observable impact operations," the Flare report states. This "dormant persistence" suggests staging, testing, or retention for future use, with bots connecting to IRC channels on a legitimate public network to blend into normal traffic.

While tactics resemble Outlaw or Maxlas-style botnets, no direct attribution exists, though Romanian-language artifacts in configs and channels indicate a possible origin. The operation prioritizes scale and reliability over stealth, affecting 1-3% of internet-facing Linux servers, particularly in legacy environments like outdated VPS or embedded devices.

Flare provides indicators of compromise and mitigation advice, including removing cron entries, deleting kits from /dev/shm, disabling SSH password authentication, and monitoring for unexpected compilations or IRC connections.

What people are saying

Cybersecurity professionals and outlets on X are reacting to the SSHStalker botnet, which infects ~7,000 legacy Linux servers using old exploits, SSH brute-forcing, and IRC for C2. Discussions highlight the dangers of unpatched infrastructure, the effectiveness of outdated techniques, and urge immediate patching and SSH hardening. Sentiments are mostly neutral with cautionary tones from analysts and journalists.

Related Articles

Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Image generated by AI

Attackers hijack Linux Snap Store apps to steal crypto phrases

Reported by AI Image generated by AI

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

Reported by AI

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

Following earlier reports of direct attacks on OpenClaw AI agents, TechRadar warns that infostealers are now disguising themselves as Claude Code, OpenClaw, and other AI developer tools. Users should exercise caution with search engine results. Published March 18, 2026.

Reported by AI

The cURL project, a key open-source networking tool, is ending its vulnerability reward program after a flood of low-quality, AI-generated reports overwhelmed its small team. Founder Daniel Stenberg cited the need to protect maintainers' mental health amid the onslaught. The decision takes effect at the end of January 2026.

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

Reported by AI

Linux stable kernel maintainer Greg Kroah-Hartman has started using an AI-assisted fuzzing tool in a branch named 'clanker' to test the kernel codebase. The tool has already prompted fixes for vulnerabilities in subsystems like ksmbd and SMB. Patches from this effort now cover areas including USB, HID, WiFi, and networking.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline