Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Immagine generata dall'IA

Researchers discover SSHStalker botnet infecting Linux servers

Immagine generata dall'IA

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

In early 2026, Flare researchers deployed an SSH honeypot with weak credentials and observed unusual intrusions over two months. After reviewing threat intelligence databases, vendor reports, and malware repositories, they confirmed the activity as previously undocumented and named it SSHStalker. The botnet combines 2009-era IRC botnet tactics with automated mass-compromise techniques, infecting systems via SSH brute-force attacks and scanning.

SSHStalker breaks into Linux servers by guessing weak or reused passwords, then deploys a multi-stage payload. Attackers drop a Golang binary disguised as "nmap" to probe port 22 for new targets, download GCC to compile C files on the host, and unpack archives like GS and bootbou.tgz containing IRC bots written in C and Perl, along with known malware families such as Tsunami and Keiten. The toolkit includes log cleaners that target shell history and records like utmp, wtmp, and lastlog, as well as rootkit-like artifacts and exploits for Linux 2.6.x kernels from 2009-2010 CVEs.

Once installed, the botnet establishes persistence through cron jobs that run every minute to restart processes if disrupted, often restoring control within 60 seconds. Analysis of staging servers revealed nearly 7,000 freshly compromised systems in January 2026, primarily cloud servers linked to Oracle Cloud infrastructure across global regions.

"We’ve designated this operation 'SSHStalker' due to its distinctive behavior: the botnet maintained persistent access without executing any observable impact operations," the Flare report states. This "dormant persistence" suggests staging, testing, or retention for future use, with bots connecting to IRC channels on a legitimate public network to blend into normal traffic.

While tactics resemble Outlaw or Maxlas-style botnets, no direct attribution exists, though Romanian-language artifacts in configs and channels indicate a possible origin. The operation prioritizes scale and reliability over stealth, affecting 1-3% of internet-facing Linux servers, particularly in legacy environments like outdated VPS or embedded devices.

Flare provides indicators of compromise and mitigation advice, including removing cron entries, deleting kits from /dev/shm, disabling SSH password authentication, and monitoring for unexpected compilations or IRC connections.

Cosa dice la gente

Cybersecurity professionals and outlets on X are reacting to the SSHStalker botnet, which infects ~7,000 legacy Linux servers using old exploits, SSH brute-forcing, and IRC for C2. Discussions highlight the dangers of unpatched infrastructure, the effectiveness of outdated techniques, and urge immediate patching and SSH hardening. Sentiments are mostly neutral with cautionary tones from analysts and journalists.

Articoli correlati

Illustration of a hacker using AI to swiftly build VoidLink malware targeting Linux cloud servers, featuring rapid code generation and infiltrated systems.
Immagine generata dall'IA

AI-assisted VoidLink malware framework targets Linux cloud servers

Riportato dall'IA Immagine generata dall'IA

Researchers at Check Point have revealed that VoidLink, a sophisticated Linux malware targeting cloud servers, was largely built by a single developer using AI tools. The framework, which includes over 30 modular plugins for long-term system access, reached 88,000 lines of code in under a week despite plans suggesting a 20-30 week timeline. This development highlights AI's potential to accelerate advanced malware creation.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

Riportato dall'IA

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

Researchers at Black Lotus Labs have identified a botnet infecting around 14,000 routers daily, mostly Asus models in the US, using advanced peer-to-peer technology to evade detection. The malware, known as KadNap, turns these devices into proxies for cybercrime activities. Infected users are advised to factory reset their routers and apply firmware updates to remove the threat.

Riportato dall'IA

Following earlier reports of direct attacks on OpenClaw AI agents, TechRadar warns that infostealers are now disguising themselves as Claude Code, OpenClaw, and other AI developer tools. Users should exercise caution with search engine results. Published March 18, 2026.

China's national cybersecurity authority has warned of security risks in the OpenClaw AI agent software, which could allow attackers to gain full control of users' computer systems. The software has seen rapid growth in downloads and usage, with major domestic cloud platforms offering one-click deployment services, but its default security configuration is weak.

Riportato dall'IA

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta