Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SSHStalker Botnet Exploits Legacy Linux Vulnerabilities

SSHStalker Botnet Exploits Legacy Linux Vulnerabilities

Posted on February 10, 2026 By CWS

A recently discovered Linux botnet, termed SSHStalker, is exploiting vulnerabilities and methods from as far back as 2009. This development comes from insights provided by cybersecurity firm Flare.

Legacy Techniques and Tools

SSHStalker employs a blend of outdated tools, including an Internet Relay Chat (IRC) bot and multiple Linux kernel exploits from 2009. Flare reports that the botnet is rather overt in its operations, running a cron job every minute for persistence and employing a ‘watchdog’ model to relaunch processes. Additionally, it deploys a variety of scanners and malware on compromised systems.

Link to Previous Botnets

Artifacts of SSHStalker bear similarities to known Romanian-linked botnet activities such as Outlaw and Dota. However, no direct connections to these older Linux campaigns were identified. This suggests the possibility of a derivative operator, a mimic, or an actor linked to the Outlaw group behind this botnet.

Infection Strategy and Impact

The botnet’s infection process involves deploying several C-based IRC bot variants, a Perl IRC bot, and malware such as Tsunami and Keiten. This strategy appears to be more opportunistic than targeted. SSHStalker has likely compromised about 7,000 systems, focusing on outdated Linux versions, which account for approximately 1–3% of internet-accessible Linux servers. Flare notes the potential impact could rise to 5–10% in environments like legacy hosting services and obsolete virtual private server images.

Operational Maturity and Infrastructure

SSHStalker uses open-source exploits commonly utilized by low-to-moderate threat actors, though its curated kernel exploits indicate a certain level of operational competence. Flare’s investigation revealed nearly two dozen binaries and files deployed by the botnet. After an SSH scanner is used, two IRC-controlled bot variants are deployed initially, followed by a Perl bot for command-and-control operations, persistence scripts, privilege escalation, and log cleaning.

Flare also uncovered the botnet’s IRC server, but no active communication was detected, suggesting it may be dormant or in preparation. The server and room structure were hosted on what appeared to be a legitimate public IRC network, indicating a well-maintained environment.

Security Week News Tags:Botnet, cyber threats, Cybersecurity, Flare, IRC, kernel exploits, legacy systems, Linux, Malware, SSHStalker

Post navigation

Previous Post: ZAST.AI Secures $6M to Enhance AI-Driven Code Security
Next Post: Critical Axios Flaw Allows Node.js Server Crashes

Related Posts

Webinar Today: The Future of Industrial Network Security Webinar Today: The Future of Industrial Network Security Security Week News
Keycard Emerges From Stealth Mode With  Million in Funding Keycard Emerges From Stealth Mode With $38 Million in Funding Security Week News
Apple Updates iOS and macOS to Prevent Malicious Font Attacks Apple Updates iOS and macOS to Prevent Malicious Font Attacks Security Week News
Fraud Prevention Firm Resistant AI Raises  Million Fraud Prevention Firm Resistant AI Raises $25 Million Security Week News
Cyber Insights 2026: Offensive Security; Where It is and Where Its Going Cyber Insights 2026: Offensive Security; Where It is and Where Its Going Security Week News
Thailand Conference Launches International Initiative to Fight Online Scams Thailand Conference Launches International Initiative to Fight Online Scams Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT36 and SideCopy Target Indian Defense with RATs
  • Prometei Botnet Targets Windows Servers with Advanced Tactics
  • Zast.AI Secures $6 Million for Advanced Code Security
  • Critical MSHTML Vulnerability Spurs Urgent Microsoft Patch
  • Defend Against Identity Threats: Join Our Webinar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT36 and SideCopy Target Indian Defense with RATs
  • Prometei Botnet Targets Windows Servers with Advanced Tactics
  • Zast.AI Secures $6 Million for Advanced Code Security
  • Critical MSHTML Vulnerability Spurs Urgent Microsoft Patch
  • Defend Against Identity Threats: Join Our Webinar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark