Gobruteforcer botnet targets Linux servers worldwide

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

The GoBruteforcer botnet, first documented in 2023, has evolved significantly in its 2025 version, as detailed by Check Point Research. This malware uses a modular structure involving web shells, downloaders, IRC bots, and bruteforcer modules to infiltrate systems. It focuses on services such as FTP, MySQL, PostgreSQL, and phpMyAdmin, targeting weak or default credentials on internet-exposed Linux servers.

Researchers estimate that more than 50,000 servers remain vulnerable, with millions of instances exposed: around 5.7 million FTP servers, 2.23 million MySQL servers, and 560,000 PostgreSQL servers operating on default ports. The botnet's success stems from widespread use of AI-suggested usernames like "appuser" and "myuser," alongside a database of 375 to 600 common weak passwords. These credential lists overlap with 2.44% of a collection of 10 million leaked passwords, making attacks viable despite the modest overlap rate. A 2024 Google Cloud Threat Horizons report noted that weak credentials facilitated 47.2% of initial cloud breaches, underscoring the method's effectiveness.

The updated IRC bot, now written in Go and obfuscated with Garbler, replaces an earlier C-based version. It employs process-masking techniques, renaming itself to "init" and hiding arguments to evade detection. Command-and-control servers distribute batches of 200 credentials, rotating profiles multiple times weekly. Infected machines scan up to 20 IP addresses per second with low bandwidth—about 64 kb/s outbound during FTP operations—and run 95 concurrent threads on 64-bit systems.

Some campaigns show financial motives, deploying tools to scan TRON wallets and sweep tokens from Binance Smart Chain. On one compromised server, analysts recovered a file with roughly 23,000 TRON addresses, with on-chain data confirming successful thefts. The botnet avoids private networks, cloud providers, and U.S. Department of Defense ranges to minimize detection risks. It also tailors attacks for sectors, using crypto-themed usernames or targeting XAMPP stacks with default FTP setups.

For resilience, it includes hardcoded fallback C2 addresses and promotes infected hosts as relays. Components update twice daily via MD5-verified scripts. To counter these threats, experts recommend strong passwords, disabling unused services, multi-factor authentication, and vigilant login monitoring.

Liittyvät artikkelit

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
AI:n luoma kuva

Researchers discover SSHStalker botnet infecting Linux servers

Raportoinut AI AI:n luoma kuva

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

A new botnet known as GoBruteforcer has emerged, focusing on brute-force attacks against Linux servers. The threat was reported by IT Security News on January 12, 2026. Details highlight the botnet's specific targeting of these systems.

Raportoinut AI

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

Raportoinut AI

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

China's national cybersecurity authority has warned of security risks in the OpenClaw AI agent software, which could allow attackers to gain full control of users' computer systems. The software has seen rapid growth in downloads and usage, with major domestic cloud platforms offering one-click deployment services, but its default security configuration is weak.

Raportoinut AI

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

 

 

 

Tämä verkkosivusto käyttää evästeitä

Käytämme evästeitä analyysiä varten parantaaksemme sivustoamme. Lue tietosuojakäytäntömme tietosuojakäytäntö lisätietoja varten.
Hylkää