Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iran-Linked Botnet Unveiled Through Open Directory Leak

Iran-Linked Botnet Unveiled Through Open Directory Leak

Posted on March 19, 2026 By CWS

An Iranian-associated threat actor inadvertently exposed their operational infrastructure by leaving a directory open on a staging server. This oversight provided researchers with an invaluable glimpse into an active botnet operation.

Unveiling the Botnet Infrastructure

The incident came to light on February 24, 2026, when a server at IP 185.221.239[.]162, registered to Dade Samane Fanava Company (PJS), an Iranian ISP, was identified during a routine scan. The server hosted an extensive 15-node relay network, featuring a mass SSH deployment framework, DDoS tools, and a bot client with an active command-and-control (C2) address.

The directory contained 449 files in 59 subdirectories, including deployment scripts and DDoS binaries. A list of credentials was also found, which were used for targeting victim systems via SSH.

Shared Infrastructure and Analysis

Researchers from Hunt.io discovered the exposed server using their AttackCapture™ feature, which indexes open directories globally. By examining a shared Let’s Encrypt TLS certificate associated with the domain *.server21[.]org, they found 14 more IP addresses with the same digital fingerprint. These were hosted on Hetzner Online GmbH in Finland and several Iranian ISPs.

The infrastructure was dual-purposed. A configuration file showed a KCP-based packet tunnel using Paquet, an open-source tool that circumvents Iran’s internet filters. Encrypted traffic was forwarded from the Iranian server to a Hetzner exit node in Finland, indicating a commercial VPN relay service running alongside the attack setup.

Botnet Operations and Defensive Measures

The botnet’s infection strategy centered on a Python script named ohhhh.py, which opened multiple SSH sessions on target machines. Once connected, the bot client source code was compiled on the victim’s machine, evading traditional detection methods. The newly compiled binary, named hex, was unlikely to raise alarms during system checks.

Defensive recommendations include blocking identified IP addresses, monitoring for specific filenames and hashes, and strengthening SSH access controls. Immediate actions such as enforcing key-based authentication and limiting concurrent sessions can mitigate credential-driven attacks.

Security teams should also watch for unexpected gcc compilation activities, as this indicates potential on-host binary construction, a tactic used to bypass standard detection mechanisms.

Stay updated on cybersecurity developments by following us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant updates.

Cyber Security News Tags:3x-ui, ArvanCloud, Botnet, cyber threat, Cybersecurity, DDoS, Hetzner Online, Infrastructure, Iran, Iranian ISP, Leak, network security, open directory, Paquet, SSH

Post navigation

Previous Post: CISA Highlights SharePoint Security Vulnerability Exploitation
Next Post: Enhancing Security with Ceros for Claude Code

Related Posts

Accessible AI-Powered Cybersecurity Platform for SME Security Accessible AI-Powered Cybersecurity Platform for SME Security Cyber Security News
Attackers are Using WSL2 as a Stealthy Hideout Inside Windows Systems Attackers are Using WSL2 as a Stealthy Hideout Inside Windows Systems Cyber Security News
AI-Powered Pentesting Tool With Claude, GPT, and Gemini models to Detect vulnerabilities AI-Powered Pentesting Tool With Claude, GPT, and Gemini models to Detect vulnerabilities Cyber Security News
OpenAI is to Launch a AI Web Browser in Coming Weeks OpenAI is to Launch a AI Web Browser in Coming Weeks Cyber Security News
Exposed ‘Kim’ Dump Exposes Kimsuky Hackers New Tactics, Techniques, and Infrastructure Exposed ‘Kim’ Dump Exposes Kimsuky Hackers New Tactics, Techniques, and Infrastructure Cyber Security News
New ClickFix Campaign Hijacks Facebook Sessions Using Fake Verification Pages New ClickFix Campaign Hijacks Facebook Sessions Using Fake Verification Pages Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Raven Secures $20M to Enhance Cloud Security Solutions
  • Enhancing Security with Ceros for Claude Code
  • Iran-Linked Botnet Unveiled Through Open Directory Leak
  • CISA Highlights SharePoint Security Vulnerability Exploitation
  • DarkSword iOS Kit Exploits Multiple Flaws for Device Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Raven Secures $20M to Enhance Cloud Security Solutions
  • Enhancing Security with Ceros for Claude Code
  • Iran-Linked Botnet Unveiled Through Open Directory Leak
  • CISA Highlights SharePoint Security Vulnerability Exploitation
  • DarkSword iOS Kit Exploits Multiple Flaws for Device Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark