Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems

SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems

Posted on February 11, 2026 By CWS

Cybersecurity experts have recently unveiled details about a sophisticated botnet known as SSHStalker, which employs the Internet Relay Chat (IRC) protocol for command-and-control (C2) operations. This new threat targets legacy Linux systems, exploiting older vulnerabilities that continue to exist within forgotten or outdated infrastructure.

Understanding SSHStalker’s Approach

According to cybersecurity firm Flare, SSHStalker employs a combination of stealth tactics and obsolete Linux exploits. These include log tampering tools and rootkits, which allow the botnet to avoid detection. Despite the age of the exploits, originally affecting Linux kernel versions from 2009 to 2010, they remain effective against neglected systems. The botnet uses an automated approach to identify and compromise vulnerable systems, incorporating them into IRC channels for control.

Mechanics and Tools Used

Unlike typical botnets that engage in activities like DDoS attacks or cryptocurrency mining, SSHStalker focuses on maintaining access and control without immediate post-exploitation actions. This dormant behavior suggests the infrastructure might be used for strategic purposes in the future. A key element of SSHStalker is its Golang-based scanner, which targets port 22 to identify open SSH servers, spreading rapidly in a worm-like manner. The attack toolkit includes various payloads, such as IRC-controlled bots and Perl scripts, which are designed to execute network flooding attacks and manage compromised bots.

The malware also employs C programs to clean SSH connection logs, erasing malicious activity traces to evade forensic analysis. Additionally, a “keep-alive” feature ensures the main malware process is quickly relaunched if terminated by defense mechanisms.

The Threat Actor and Potential Origins

Flare’s research into the botnet’s infrastructure revealed a vast array of offensive open-source tools and malware samples, including rootkits, cryptocurrency miners, and scripts for stealing AWS credentials. The presence of Romanian-style elements in IRC channels led researchers to suspect a Romanian origin for the threat actor, potentially linked to the Outlaw hacking group. This group is known for its disciplined operations and use of mature orchestration techniques, rather than developing new exploits or rootkits.

SSHStalker’s strategy demonstrates a focus on efficient mass compromise and long-term persistence across heterogeneous Linux environments, relying heavily on C language for core components and using shell scripts for orchestration and maintenance tasks.

As SSHStalker continues to exploit legacy systems, organizations are urged to review and update their cybersecurity measures to protect against this and similar threats. The reliance on outdated vulnerabilities underscores the importance of maintaining up-to-date security practices to prevent exploitation by advanced botnets like SSHStalker.

The Hacker News Tags:Botnet, Cybersecurity, Flare, Golang scanner, IRC, legacy exploits, Linux, Outlaw group, Rootkits, SSHStalker

Post navigation

Previous Post: Microsoft Addresses Teams Assignment Issues After Update Glitch
Next Post: GitGuardian Secures $50M to Enhance AI Identity Security

Related Posts

North Korea-Linked UNC1069 Targets Crypto with AI Attacks North Korea-Linked UNC1069 Targets Crypto with AI Attacks The Hacker News
Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts The Hacker News
Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT The Hacker News
Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware The Hacker News
Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack The Hacker News
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Security Patches Released by Over 60 Software Vendors
  • GitGuardian Secures $50M to Enhance AI and Security Solutions
  • GitGuardian Secures $50M to Enhance AI Identity Security
  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Security Patches Released by Over 60 Software Vendors
  • GitGuardian Secures $50M to Enhance AI and Security Solutions
  • GitGuardian Secures $50M to Enhance AI Identity Security
  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark