Malware

Fuatilia
Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Picha iliyoundwa na AI

Researchers discover SSHStalker botnet infecting Linux servers

Imeripotiwa na AI Picha iliyoundwa na AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Cybersecurity researchers have identified a fraudulent website mimicking the popular AI tool Claude that delivers backdoor malware to visitors. The discovery highlights how cybercriminals are capitalizing on growing interest in artificial intelligence platforms.

Imeripotiwa na AI

Daemon Tools, a popular disk image mounting app, was compromised in a supply-chain attack starting April 8, delivering malware through official updates. Security firm Kaspersky reported infections on thousands of machines across over 100 countries. Users are urged to scan their systems immediately.

A North Korean hacking group known as UNC1069 has employed AI-generated videos to deliver malware targeting both macOS and Windows systems. This tactic highlights evolving methods in cyber threats. The development was reported by TechRadar on February 11, 2026.

Imeripotiwa na AI

Cyble Research and Intelligence Labs has revealed ShadowHS, a sophisticated fileless framework for post-exploitation on Linux systems. The tool enables stealthy, in-memory operations and long-term access for attackers. It features a weaponized version of hackshell and advanced evasion techniques.

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

Imeripotiwa na AI

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

Ijumaa, 13. Mwezi wa tatu 2026, 21:43:16

FBI seeks victims of malware in Steam indie games

Alhamisi, 12. Mwezi wa tatu 2026, 22:40:07

US and Europe disrupt SocksEscort proxy network

Jumatano, 11. Mwezi wa tatu 2026, 07:15:19

14,000 Asus routers infected by takedown-resistant KadNap malware

Jumatatu, 23. Mwezi wa pili 2026, 08:01:15

Malicious npm packages harvest crypto keys and secrets

Ijumaa, 20. Mwezi wa pili 2026, 10:04:38

Massiv android malware targets portuguese users with fake iptv app

Jumamosi, 24. Mwezi wa kwanza 2026, 21:25:46

Wiper malware targets Poland's energy grid but causes no blackout

Alhamisi, 22. Mwezi wa kwanza 2026, 03:56:29

Malicious PyPI package impersonates SymPy to deploy XMRig miner

Jumatano, 21. Mwezi wa kwanza 2026, 17:17:18

Attackers hijack Linux Snap Store apps to steal crypto phrases

Jumatano, 21. Mwezi wa kwanza 2026, 05:18:40

AI-assisted VoidLink malware framework targets Linux cloud servers

Jumatano, 14. Mwezi wa kwanza 2026, 21:57:45

Check Point discovers advanced VoidLink Linux malware for clouds

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa