Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Rapid SSH Worm Exploits Linux Systems with Credential Stuffing

Rapid SSH Worm Exploits Linux Systems with Credential Stuffing

Posted on February 12, 2026 By CWS

A new and highly efficient self-propagating worm has been detected, capable of compromising Linux systems through SSH brute-force attacks in a mere four seconds. This threat leverages a combination of traditional credential stuffing and advanced cryptographic command verification, forming a rapidly spreading botnet that preys on devices with weak authentication.

How the Worm Exploits Vulnerabilities

The worm’s ability to exploit unchanged default passwords highlights ongoing vulnerabilities in systems, especially within Internet of Things (IoT) devices like Raspberry Pi. Once the worm gains access through weak credentials, a small bash script, only 4.7 kilobytes in size, is uploaded and executed. This script secures the system by establishing persistence, removing rival malware, and connecting the device to a command and control network via Internet Relay Chat (IRC).

Discovery and Propagation Patterns

Researchers at the Internet Storm Center identified this malicious activity through DShield honeypot sensors designed to detect SSH attacks. The worm was traced back to a compromised Raspberry Pi in Germany, which had fallen victim to the same attack chain. The botnet’s worm-like propagation enables it to rapidly infiltrate vulnerable systems, amplifying its reach across the internet.

The attack initiates when the malware authenticates using common default credentials, predominantly targeting Raspberry Pi devices. After accessing the system, the script modifies files and schedules tasks to maintain control, eliminating processes associated with competing threats such as botnets and cryptocurrency miners.

Advanced Security Features

Setting this worm apart is its use of cryptographically signed command verification. Embedded RSA public keys ensure that only validated commands from the command and control operator are executed, safeguarding compromised devices from unauthorized access. Once established, the malware connects to various IRC networks, waiting for further commands in a specific channel named “#biret.”

The worm escalates its spread by installing scanning tools like Zmap and sshpass, enabling scans of 100,000 random IP addresses. This aggressive approach underscores the importance of securing networks against such threats.

Prevention and Security Measures

Organizations can mitigate these risks by disabling password-based SSH authentication in favor of key-based methods. Further security can be achieved by removing default user accounts on devices like Raspberry Pi, deploying tools like fail2ban to protect against brute-force attacks, and isolating IoT devices from critical network infrastructure through segmentation.

Stay updated with the latest security news by following us on Google News, LinkedIn, and X. Set CSN as your preferred source on Google to ensure instant updates.

Cyber Security News Tags:Botnet, brute-force attacks, credential stuffing, Cybersecurity, IoT security, Linux vulnerability, Malware, network security, Raspberry Pi, SSH security

Post navigation

Previous Post: Odido Telecom Hacked: 6.2 Million Accounts Compromised
Next Post: Feiniu NAS Devices Targeted in Major Botnet Attack

Related Posts

New Windows 11 KB5074109 Update Breaks Systems New Windows 11 KB5074109 Update Breaks Systems Cyber Security News
Multiple Kibana Vulnerabilities Enables SSRF and XSS Attacks Multiple Kibana Vulnerabilities Enables SSRF and XSS Attacks Cyber Security News
Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25 Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25 Cyber Security News
New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild Cyber Security News
New “123 | Stealer” Advertised on Underground Hacking Forums for 0 Per Month New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month Cyber Security News
Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News