Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Rapid SSH Worm Exploits Linux Systems with Credential Stuffing

Rapid SSH Worm Exploits Linux Systems with Credential Stuffing

Posted on February 12, 2026 By CWS

A new and highly efficient self-propagating worm has been detected, capable of compromising Linux systems through SSH brute-force attacks in a mere four seconds. This threat leverages a combination of traditional credential stuffing and advanced cryptographic command verification, forming a rapidly spreading botnet that preys on devices with weak authentication.

How the Worm Exploits Vulnerabilities

The worm’s ability to exploit unchanged default passwords highlights ongoing vulnerabilities in systems, especially within Internet of Things (IoT) devices like Raspberry Pi. Once the worm gains access through weak credentials, a small bash script, only 4.7 kilobytes in size, is uploaded and executed. This script secures the system by establishing persistence, removing rival malware, and connecting the device to a command and control network via Internet Relay Chat (IRC).

Discovery and Propagation Patterns

Researchers at the Internet Storm Center identified this malicious activity through DShield honeypot sensors designed to detect SSH attacks. The worm was traced back to a compromised Raspberry Pi in Germany, which had fallen victim to the same attack chain. The botnet’s worm-like propagation enables it to rapidly infiltrate vulnerable systems, amplifying its reach across the internet.

The attack initiates when the malware authenticates using common default credentials, predominantly targeting Raspberry Pi devices. After accessing the system, the script modifies files and schedules tasks to maintain control, eliminating processes associated with competing threats such as botnets and cryptocurrency miners.

Advanced Security Features

Setting this worm apart is its use of cryptographically signed command verification. Embedded RSA public keys ensure that only validated commands from the command and control operator are executed, safeguarding compromised devices from unauthorized access. Once established, the malware connects to various IRC networks, waiting for further commands in a specific channel named “#biret.”

The worm escalates its spread by installing scanning tools like Zmap and sshpass, enabling scans of 100,000 random IP addresses. This aggressive approach underscores the importance of securing networks against such threats.

Prevention and Security Measures

Organizations can mitigate these risks by disabling password-based SSH authentication in favor of key-based methods. Further security can be achieved by removing default user accounts on devices like Raspberry Pi, deploying tools like fail2ban to protect against brute-force attacks, and isolating IoT devices from critical network infrastructure through segmentation.

Stay updated with the latest security news by following us on Google News, LinkedIn, and X. Set CSN as your preferred source on Google to ensure instant updates.

Cyber Security News Tags:Botnet, brute-force attacks, credential stuffing, Cybersecurity, IoT security, Linux vulnerability, Malware, network security, Raspberry Pi, SSH security

Post navigation

Previous Post: Odido Telecom Hacked: 6.2 Million Accounts Compromised
Next Post: Feiniu NAS Devices Targeted in Major Botnet Attack

Related Posts

Midnight Ransomware Decrypter Flaws Opens the Door to File Recovery Midnight Ransomware Decrypter Flaws Opens the Door to File Recovery Cyber Security News
MatrixPDF Attacks Gmail Users Bypassing Email Filters and Fetch Malicious Payload MatrixPDF Attacks Gmail Users Bypassing Email Filters and Fetch Malicious Payload Cyber Security News
AI-Driven Malware Surge by Transparent Tribe AI-Driven Malware Surge by Transparent Tribe Cyber Security News
Hackers Registered 2,000+ Fake Holiday-Themed Online Stores to Steal User Payments Hackers Registered 2,000+ Fake Holiday-Themed Online Stores to Steal User Payments Cyber Security News
Windows 11 Gets New AI-Powered Features Windows 11 Gets New AI-Powered Features Cyber Security News
AI-powered Email Attack Tool Used By Hackers To Launch Massive Phishing Attack AI-powered Email Attack Tool Used By Hackers To Launch Massive Phishing Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark