New Linux botnet SSHStalker uses IRC for command-and-control

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

The SSHStalker botnet, documented by threat intelligence firm Flare, operates using the Internet Relay Chat (IRC) protocol, originally developed in 1988 and popular in the 1990s for text-based messaging. This choice emphasizes simplicity, low bandwidth, and resilience through multiple C-based bots and redundant servers and channels, rather than advanced stealth techniques.

Initial infection occurs via a Go-based tool disguised as the nmap network scanner, which performs noisy SSH scans and brute-force attacks. Once inside a host, the malware uses the compromised system to scan for more targets, enabling worm-like propagation. Flare analyzed a file containing results from nearly 7,000 scans conducted in January, primarily aimed at Oracle Cloud infrastructure.

After gaining access, SSHStalker downloads the GCC compiler to build payloads directly on the victim machine, enhancing portability. It then deploys C-coded IRC bots with predefined command-and-control servers and channels to integrate the host into the network. Additional components from archives named GS and bootbou handle orchestration.

Persistence is maintained through cron jobs running every 60 seconds, acting as a watchdog to restart the main process if terminated. For privilege escalation, the botnet exploits 16 common vulnerabilities and exposures (CVEs) from Linux kernels dated 2009-2010, following initial low-privilege entry.

Monetization features include harvesting AWS keys, scanning websites, and deploying the PhoenixMiner for Ethereum cryptomining. DDoS tools are built-in but unused so far; bots typically connect to C2 servers and remain idle, indicating possible testing or resource stockpiling.

Flare notes resemblances to the Outlaw/Maxlas botnet family and Romanian-linked indicators but has not tied it to a specific group. To counter it, the firm advises monitoring for compiler activity, IRC outbound traffic, and frequent cron jobs. Defensive steps include disabling SSH password logins, removing compilers from production environments, applying egress filters, and blocking execution in /dev/shm.

Mga Kaugnay na Artikulo

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Larawang ginawa ng AI

Researchers discover SSHStalker botnet infecting Linux servers

Iniulat ng AI Larawang ginawa ng AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

Iniulat ng AI

Cyble Research and Intelligence Labs has revealed ShadowHS, a sophisticated fileless framework for post-exploitation on Linux systems. The tool enables stealthy, in-memory operations and long-term access for attackers. It features a weaponized version of hackshell and advanced evasion techniques.

Developers of the popular AI tool OpenClaw released patches for three high-severity vulnerabilities, including one that allowed attackers with basic pairing privileges to silently gain full administrative control. The flaw, tracked as CVE-2026-33579 and rated up to 9.8 out of 10 in severity, has raised alarms among security experts. Thousands of exposed instances may have been compromised unknowingly.

Iniulat ng AI

Researchers at Black Lotus Labs have identified a botnet infecting around 14,000 routers daily, mostly Asus models in the US, using advanced peer-to-peer technology to evade detection. The malware, known as KadNap, turns these devices into proxies for cybercrime activities. Infected users are advised to factory reset their routers and apply firmware updates to remove the threat.

Following earlier reports of direct attacks on OpenClaw AI agents, TechRadar warns that infostealers are now disguising themselves as Claude Code, OpenClaw, and other AI developer tools. Users should exercise caution with search engine results. Published March 18, 2026.

Iniulat ng AI

Daniel Stenberg, creator of the widely used curl program, draws parallels between his project and a cyberattack that nearly succeeded two years ago. In an interview in Huddinge, he stresses the importance of trust in open-source software underpinning the internet. An expert warns he could theoretically shut down half the internet.

 

 

 

Gumagamit ng cookies ang website na ito

Gumagamit kami ng cookies para sa analytics upang mapabuti ang aming site. Basahin ang aming patakaran sa privacy para sa higit pang impormasyon.
Tanggihan