Gobruteforcer botnet targets Linux servers worldwide

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

The GoBruteforcer botnet, first documented in 2023, has evolved significantly in its 2025 version, as detailed by Check Point Research. This malware uses a modular structure involving web shells, downloaders, IRC bots, and bruteforcer modules to infiltrate systems. It focuses on services such as FTP, MySQL, PostgreSQL, and phpMyAdmin, targeting weak or default credentials on internet-exposed Linux servers.

Researchers estimate that more than 50,000 servers remain vulnerable, with millions of instances exposed: around 5.7 million FTP servers, 2.23 million MySQL servers, and 560,000 PostgreSQL servers operating on default ports. The botnet's success stems from widespread use of AI-suggested usernames like "appuser" and "myuser," alongside a database of 375 to 600 common weak passwords. These credential lists overlap with 2.44% of a collection of 10 million leaked passwords, making attacks viable despite the modest overlap rate. A 2024 Google Cloud Threat Horizons report noted that weak credentials facilitated 47.2% of initial cloud breaches, underscoring the method's effectiveness.

The updated IRC bot, now written in Go and obfuscated with Garbler, replaces an earlier C-based version. It employs process-masking techniques, renaming itself to "init" and hiding arguments to evade detection. Command-and-control servers distribute batches of 200 credentials, rotating profiles multiple times weekly. Infected machines scan up to 20 IP addresses per second with low bandwidth—about 64 kb/s outbound during FTP operations—and run 95 concurrent threads on 64-bit systems.

Some campaigns show financial motives, deploying tools to scan TRON wallets and sweep tokens from Binance Smart Chain. On one compromised server, analysts recovered a file with roughly 23,000 TRON addresses, with on-chain data confirming successful thefts. The botnet avoids private networks, cloud providers, and U.S. Department of Defense ranges to minimize detection risks. It also tailors attacks for sectors, using crypto-themed usernames or targeting XAMPP stacks with default FTP setups.

For resilience, it includes hardcoded fallback C2 addresses and promotes infected hosts as relays. Components update twice daily via MD5-verified scripts. To counter these threats, experts recommend strong passwords, disabling unused services, multi-factor authentication, and vigilant login monitoring.

相关文章

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
AI 生成的图像

Researchers discover SSHStalker botnet infecting Linux servers

由 AI 报道 AI 生成的图像

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

A new botnet known as GoBruteforcer has emerged, focusing on brute-force attacks against Linux servers. The threat was reported by IT Security News on January 12, 2026. Details highlight the botnet's specific targeting of these systems.

由 AI 报道

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

由 AI 报道

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

中国国家网络安全机构警告OpenClaw AI代理软件存在安全漏洞,可能允许攻击者完全控制用户计算机系统。该软件最近下载量激增,主要云平台提供一键部署服务,但默认安全配置薄弱。

由 AI 报道

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

 

 

 

此网站使用 cookie

我们使用 cookie 进行分析以改进我们的网站。阅读我们的 隐私政策 以获取更多信息。
拒绝