Gobruteforcer botnet targets Linux servers worldwide

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

The GoBruteforcer botnet, first documented in 2023, has evolved significantly in its 2025 version, as detailed by Check Point Research. This malware uses a modular structure involving web shells, downloaders, IRC bots, and bruteforcer modules to infiltrate systems. It focuses on services such as FTP, MySQL, PostgreSQL, and phpMyAdmin, targeting weak or default credentials on internet-exposed Linux servers.

Researchers estimate that more than 50,000 servers remain vulnerable, with millions of instances exposed: around 5.7 million FTP servers, 2.23 million MySQL servers, and 560,000 PostgreSQL servers operating on default ports. The botnet's success stems from widespread use of AI-suggested usernames like "appuser" and "myuser," alongside a database of 375 to 600 common weak passwords. These credential lists overlap with 2.44% of a collection of 10 million leaked passwords, making attacks viable despite the modest overlap rate. A 2024 Google Cloud Threat Horizons report noted that weak credentials facilitated 47.2% of initial cloud breaches, underscoring the method's effectiveness.

The updated IRC bot, now written in Go and obfuscated with Garbler, replaces an earlier C-based version. It employs process-masking techniques, renaming itself to "init" and hiding arguments to evade detection. Command-and-control servers distribute batches of 200 credentials, rotating profiles multiple times weekly. Infected machines scan up to 20 IP addresses per second with low bandwidth—about 64 kb/s outbound during FTP operations—and run 95 concurrent threads on 64-bit systems.

Some campaigns show financial motives, deploying tools to scan TRON wallets and sweep tokens from Binance Smart Chain. On one compromised server, analysts recovered a file with roughly 23,000 TRON addresses, with on-chain data confirming successful thefts. The botnet avoids private networks, cloud providers, and U.S. Department of Defense ranges to minimize detection risks. It also tailors attacks for sectors, using crypto-themed usernames or targeting XAMPP stacks with default FTP setups.

For resilience, it includes hardcoded fallback C2 addresses and promotes infected hosts as relays. Components update twice daily via MD5-verified scripts. To counter these threats, experts recommend strong passwords, disabling unused services, multi-factor authentication, and vigilant login monitoring.

관련 기사

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
AI에 의해 생성된 이미지

Researchers discover SSHStalker botnet infecting Linux servers

AI에 의해 보고됨 AI에 의해 생성된 이미지

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

A new botnet known as GoBruteforcer has emerged, focusing on brute-force attacks against Linux servers. The threat was reported by IT Security News on January 12, 2026. Details highlight the botnet's specific targeting of these systems.

AI에 의해 보고됨

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

AI에 의해 보고됨

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

중국의 국가 사이버보안 당국은 OpenClaw AI 에이전트 소프트웨어의 보안 위험을 경고했다. 이 소프트웨어는 공격자들이 사용자 컴퓨터 시스템의 완전한 제어를 얻을 수 있게 할 수 있으며, 다운로드와 사용량이 급증하고 주요 국내 클라우드 플랫폼에서 원클릭 배포 서비스를 제공하고 있지만 기본 보안 설정이 취약하다.

AI에 의해 보고됨

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

 

 

 

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부