Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto

Posted on May 28, 2025May 28, 2025 By CWS

Might 28, 2025Ravie LakshmananIoT Safety / Cryptocurrency
Embedded Linux-based Web of Issues (IoT) gadgets have change into the goal of a brand new botnet dubbed PumaBot.
Written in Go, the botnet is designed to conduct brute-force assaults in opposition to SSH cases to develop in dimension and scale and ship extra malware to the contaminated hosts.
“Reasonably than scanning the web, the malware retrieves a listing of targets from a command-and-control (C2) server and makes an attempt to brute drive SSH credentials,” Darktrace mentioned in an evaluation shared with The Hacker Information. “Upon gaining entry, it receives distant instructions and establishes persistence utilizing system service information.”
The botnet malware is designed to acquire preliminary entry by way of efficiently brute-forcing SSH credentials throughout a listing of harvested IP addresses with open SSH ports. The checklist of IP addresses to focus on is retrieved from an exterior server (“ssh.ddos-cc[.]org”).

As a part of its brute-force makes an attempt, the malware additionally performs varied checks to find out if the system is appropriate and isn’t a honeypot. Moreover, it checks the presence of the string “Pumatronix,” a producer of surveillance and site visitors digicam methods, indicating both an try to particularly single them out or exclude them.
The malware then proceeds to gather and exfiltrate fundamental system info to the C2 server, after which it units up persistence and executes instructions obtained from the server.
“The malware writes itself to /lib/redis, making an attempt to disguise itself as a authentic Redis system file,” Darktrace mentioned. “It then creates a persistent systemd service in /and so forth/systemd/system, named both redis.service or mysqI.service (notice the spelling of mysql with a capital I) relying on what has been hardcoded into the malware.”
In doing so, it permits the malware to provide the impression that it is benign and likewise survive reboots. Two of the instructions executed by the botnet are “xmrig” and “networkxm” indicating that the compromised gadgets are getting used to mine cryptocurrency in a bootleg method.

Nevertheless, the instructions are launched with out specifying the complete paths, a facet that indicators that the payloads are probably downloaded or unpacked elsewhere on the contaminated host. Darktrace mentioned its evaluation of the marketing campaign uncovered different associated binaries which are mentioned to be deployed as a part of a broader marketing campaign –

ddaemon, a Go-based backdoor which is retrieve the binary “networkxm” into “/usr/src/bao/networkxm” and execute the shell script “installx.sh”
networkxm, an SSH brute-force instrument that capabilities much like the botnet’s preliminary stage by fetching a password checklist from a C2 server and makes an attempt to attach by way of SSH throughout a listing of goal IP addresses
installx.sh, which is used to retrieve one other shell script “jc.sh” from “1.lusyn[.]xyz,” grant it learn, write, and execute permissions for all entry ranges, run the script, and clear bash historical past
jc.sh, which is configured to obtain a malicious “pam_unix.so” file from an exterior server and use it to switch the authentic counterpart put in on the machine, in addition to retrieve and run one other binary named “1” from the identical server
pam_unix.so, which acts as a rootkit that steals credentials by intercepting profitable logins and writing them to the file “/usr/bin/con.txt”
1, which is used to watch for the file “con.txt” being written or moved to “/usr/bin/” after which exfiltrate its contents to the identical server

Provided that the SSH brute-force capabilities of the botnet malware lends it worm-like capabilities, customers are required to maintain an eye fixed out for anomalous SSH login exercise, significantly failed login makes an attempt, audit systemd providers frequently, assessment authorized_keys information for the presence of unknown SSH keys, apply strict firewall guidelines to restrict publicity, and filter HTTP requests with non-standard headers, resembling X-API-KEY: jieruidashabi.
“The botnet represents a persistent Go-based SSH risk that leverages automation, credential brute-forcing, and native Linux instruments to achieve and keep management over compromised methods,” Darktrace mentioned.
“By mimicking authentic binaries (e.g., Redis), abusing systemd for persistence, and embedding fingerprinting logic to keep away from detection in honeypots or restricted environments, it demonstrates an intent to evade defenses.”

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Botnet, Credentials, Crypto, Devices, IoT, Linux, PumaBot, SSH, Steal, Targets

Post navigation

Previous Post: OneDrive Gives Web Apps Full Read Access to All Files
Next Post: Vietnamese Hackers Distribute Malware via Fake AI-Themed Websites

Related Posts

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise The Hacker News
MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks The Hacker News
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations The Hacker News
China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom The Hacker News
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft The Hacker News
Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies
  • Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report 
  • GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms
  • Venezuela’s Maduro Says Huawei Mate X6 Gift From China is Unhackable by U.S. Spies
  • LunaLock Ransomware Attacking Artists to Steal and Encrypt Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies
  • Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report 
  • GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms
  • Venezuela’s Maduro Says Huawei Mate X6 Gift From China is Unhackable by U.S. Spies
  • LunaLock Ransomware Attacking Artists to Steal and Encrypt Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News