Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SSHStalker Botnet Exploits Legacy Linux Vulnerabilities

SSHStalker Botnet Exploits Legacy Linux Vulnerabilities

Posted on February 10, 2026 By CWS

A recently discovered Linux botnet, termed SSHStalker, is exploiting vulnerabilities and methods from as far back as 2009. This development comes from insights provided by cybersecurity firm Flare.

Legacy Techniques and Tools

SSHStalker employs a blend of outdated tools, including an Internet Relay Chat (IRC) bot and multiple Linux kernel exploits from 2009. Flare reports that the botnet is rather overt in its operations, running a cron job every minute for persistence and employing a ‘watchdog’ model to relaunch processes. Additionally, it deploys a variety of scanners and malware on compromised systems.

Link to Previous Botnets

Artifacts of SSHStalker bear similarities to known Romanian-linked botnet activities such as Outlaw and Dota. However, no direct connections to these older Linux campaigns were identified. This suggests the possibility of a derivative operator, a mimic, or an actor linked to the Outlaw group behind this botnet.

Infection Strategy and Impact

The botnet’s infection process involves deploying several C-based IRC bot variants, a Perl IRC bot, and malware such as Tsunami and Keiten. This strategy appears to be more opportunistic than targeted. SSHStalker has likely compromised about 7,000 systems, focusing on outdated Linux versions, which account for approximately 1–3% of internet-accessible Linux servers. Flare notes the potential impact could rise to 5–10% in environments like legacy hosting services and obsolete virtual private server images.

Operational Maturity and Infrastructure

SSHStalker uses open-source exploits commonly utilized by low-to-moderate threat actors, though its curated kernel exploits indicate a certain level of operational competence. Flare’s investigation revealed nearly two dozen binaries and files deployed by the botnet. After an SSH scanner is used, two IRC-controlled bot variants are deployed initially, followed by a Perl bot for command-and-control operations, persistence scripts, privilege escalation, and log cleaning.

Flare also uncovered the botnet’s IRC server, but no active communication was detected, suggesting it may be dormant or in preparation. The server and room structure were hosted on what appeared to be a legitimate public IRC network, indicating a well-maintained environment.

Security Week News Tags:Botnet, cyber threats, Cybersecurity, Flare, IRC, kernel exploits, legacy systems, Linux, Malware, SSHStalker

Post navigation

Previous Post: ZAST.AI Secures $6M to Enhance AI-Driven Code Security
Next Post: Critical Axios Flaw Allows Node.js Server Crashes

Related Posts

Threat Actor Infests Hotels With New RAT Threat Actor Infests Hotels With New RAT Security Week News
Why Scamming Can’t Be Stopped—But It Can Be Managed Why Scamming Can’t Be Stopped—But It Can Be Managed Security Week News
Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack Security Week News
Adobe Addresses 44 Vulnerabilities in Software Update Adobe Addresses 44 Vulnerabilities in Software Update Security Week News
766,000 Impacted by Data Breach at Dealership Software Provider Motility 766,000 Impacted by Data Breach at Dealership Software Provider Motility Security Week News
NPM Package With 56,000 Downloads Steals WhatsApp Credentials, Data NPM Package With 56,000 Downloads Steals WhatsApp Credentials, Data Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News