Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers

SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers

Posted on February 12, 2026 By CWS

A newly identified botnet, dubbed SSHStalker, is leveraging Internet Relay Chat (IRC) for command and control while automating the compromise of Linux servers through SSH. This botnet, discovered by Flare researchers, penetrates systems by exploiting weak or reused passwords, converting them into platforms for launching further attacks.

How SSHStalker Operates

The SSHStalker botnet was observed in honeypot intrusions during early 2026, where attackers deployed a Golang binary misleadingly named “nmap” to probe for vulnerable port 22 targets. Following this, they downloaded GCC, compiled small C files, and unpacked archives like GS and bootbou.tgz to install IRC bots and auxiliary tools.

Notably, almost 7,000 fresh SSH scan results from January 2026 were referenced in the data staged by attackers, indicating a focus on large cloud hosting IP ranges. Flare researchers classified this operation as a scale-first approach, prioritizing widespread impact over stealth, with components designed for cost-efficiency and repeatability on Linux systems.

Technical Aspects and Persistence

SSHStalker’s attack methodology involves multiple IRC bot variants coded in C and Perl, supported by redundant servers and channels. The botnet also includes log cleaners targeting shell history and system records, and utilizes older Linux exploits to compromise outdated systems.

A notable feature is its persistence mechanism: SSHStalker logs its directory and sets a cron job to check and restart its processes every minute. This resilience means that even if defenders terminate the main process, the botnet can regain control in under a minute, necessitating comprehensive removal of all components to prevent reactivation.

Prevention and Defense Strategies

To combat this threat, security experts recommend disabling SSH password authentication, enforcing key-based access, limiting brute-force attempts, and restricting SSH access to trusted networks. Monitoring for unexpected GCC or make commands and new binaries executing shortly after compilation can also aid in early detection.

Network defenses should focus on identifying IRC client activity, using egress filtering to block long-lived outbound TCP sessions to unknown IRC servers. These steps are crucial for mitigating the risks posed by SSHStalker and similar botnets.

For ongoing updates and insights into cybersecurity threats, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google to stay informed.

Cyber Security News Tags:Botnet, Cybersecurity, Flare research, IRC, Linux, Malware, network security, password security, SSH, SSHStalker

Post navigation

Previous Post: Severe Fiber v2 Vulnerability in Go Risks Security Breaches
Next Post: Critical Apple 0-Day Flaw Targets High-Profile Users

Related Posts

Conti Group Member Responsible for Deploying Ransomware Extradited to USA Conti Group Member Responsible for Deploying Ransomware Extradited to USA Cyber Security News
North Korean Hackers use Code Abuse Tactics for ‘Contagious Interview’ Campaign North Korean Hackers use Code Abuse Tactics for ‘Contagious Interview’ Campaign Cyber Security News
PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation Cyber Security News
CISA Warns of VMware Tools and Aria Operations 0-Day Vulnerability Exploited in Attacks CISA Warns of VMware Tools and Aria Operations 0-Day Vulnerability Exploited in Attacks Cyber Security News
Microsoft Investigating Teams and Exchange Online Services Disruption Impacting Users Microsoft Investigating Teams and Exchange Online Services Disruption Impacting Users Cyber Security News
Hackers Registered 18,000 Holiday-Themed Domains Targeting ‘Christmas,’ ‘Black Friday,’ and ‘Flash Sale’ Hackers Registered 18,000 Holiday-Themed Domains Targeting ‘Christmas,’ ‘Black Friday,’ and ‘Flash Sale’ Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russia’s Ban on WhatsApp Impacts Over 100 Million Users
  • Critical Apple 0-Day Flaw Targets High-Profile Users
  • SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers
  • Severe Fiber v2 Vulnerability in Go Risks Security Breaches
  • Malicious Outlook Add-In Exploits Supply Chain Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russia’s Ban on WhatsApp Impacts Over 100 Million Users
  • Critical Apple 0-Day Flaw Targets High-Profile Users
  • SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers
  • Severe Fiber v2 Vulnerability in Go Risks Security Breaches
  • Malicious Outlook Add-In Exploits Supply Chain Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark