Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SSHStalker Botnet Exploits Legacy Linux Vulnerabilities

SSHStalker Botnet Exploits Legacy Linux Vulnerabilities

Posted on February 10, 2026 By CWS

A recently discovered Linux botnet, termed SSHStalker, is exploiting vulnerabilities and methods from as far back as 2009. This development comes from insights provided by cybersecurity firm Flare.

Legacy Techniques and Tools

SSHStalker employs a blend of outdated tools, including an Internet Relay Chat (IRC) bot and multiple Linux kernel exploits from 2009. Flare reports that the botnet is rather overt in its operations, running a cron job every minute for persistence and employing a ‘watchdog’ model to relaunch processes. Additionally, it deploys a variety of scanners and malware on compromised systems.

Link to Previous Botnets

Artifacts of SSHStalker bear similarities to known Romanian-linked botnet activities such as Outlaw and Dota. However, no direct connections to these older Linux campaigns were identified. This suggests the possibility of a derivative operator, a mimic, or an actor linked to the Outlaw group behind this botnet.

Infection Strategy and Impact

The botnet’s infection process involves deploying several C-based IRC bot variants, a Perl IRC bot, and malware such as Tsunami and Keiten. This strategy appears to be more opportunistic than targeted. SSHStalker has likely compromised about 7,000 systems, focusing on outdated Linux versions, which account for approximately 1–3% of internet-accessible Linux servers. Flare notes the potential impact could rise to 5–10% in environments like legacy hosting services and obsolete virtual private server images.

Operational Maturity and Infrastructure

SSHStalker uses open-source exploits commonly utilized by low-to-moderate threat actors, though its curated kernel exploits indicate a certain level of operational competence. Flare’s investigation revealed nearly two dozen binaries and files deployed by the botnet. After an SSH scanner is used, two IRC-controlled bot variants are deployed initially, followed by a Perl bot for command-and-control operations, persistence scripts, privilege escalation, and log cleaning.

Flare also uncovered the botnet’s IRC server, but no active communication was detected, suggesting it may be dormant or in preparation. The server and room structure were hosted on what appeared to be a legitimate public IRC network, indicating a well-maintained environment.

Security Week News Tags:Botnet, cyber threats, Cybersecurity, Flare, IRC, kernel exploits, legacy systems, Linux, Malware, SSHStalker

Post navigation

Previous Post: ZAST.AI Secures $6M to Enhance AI-Driven Code Security
Next Post: Critical Axios Flaw Allows Node.js Server Crashes

Related Posts

Scalekit Raises .5 Million to Secure AI Agent Authentication Scalekit Raises $5.5 Million to Secure AI Agent Authentication Security Week News
Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Security Week News
SIM Farm Dismantled in Europe, Seven Arrested SIM Farm Dismantled in Europe, Seven Arrested Security Week News
Google Says Android pKVM Earns Highest Level of Security Assurance Google Says Android pKVM Earns Highest Level of Security Assurance Security Week News
Security Firm Andy Frain Says 100,000 People Impacted by Ransomware Attack Security Firm Andy Frain Says 100,000 People Impacted by Ransomware Attack Security Week News
Grok-4 Falls to a Jailbreak Two days After Its Release Grok-4 Falls to a Jailbreak Two days After Its Release Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybercriminals Exploit AI to Distribute macOS Malware
  • Microsoft to Update Windows Secure Boot in 2026
  • Critical SandboxJS Flaw Raises Security Concerns
  • Signs of Concealed Information in Security Management
  • APT36 and SideCopy Target Indian Defense with RATs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybercriminals Exploit AI to Distribute macOS Malware
  • Microsoft to Update Windows Secure Boot in 2026
  • Critical SandboxJS Flaw Raises Security Concerns
  • Signs of Concealed Information in Security Management
  • APT36 and SideCopy Target Indian Defense with RATs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark