Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iran-Linked Botnet Unveiled Through Open Directory Leak

Iran-Linked Botnet Unveiled Through Open Directory Leak

Posted on March 19, 2026 By CWS

An Iranian-associated threat actor inadvertently exposed their operational infrastructure by leaving a directory open on a staging server. This oversight provided researchers with an invaluable glimpse into an active botnet operation.

Unveiling the Botnet Infrastructure

The incident came to light on February 24, 2026, when a server at IP 185.221.239[.]162, registered to Dade Samane Fanava Company (PJS), an Iranian ISP, was identified during a routine scan. The server hosted an extensive 15-node relay network, featuring a mass SSH deployment framework, DDoS tools, and a bot client with an active command-and-control (C2) address.

The directory contained 449 files in 59 subdirectories, including deployment scripts and DDoS binaries. A list of credentials was also found, which were used for targeting victim systems via SSH.

Shared Infrastructure and Analysis

Researchers from Hunt.io discovered the exposed server using their AttackCapture™ feature, which indexes open directories globally. By examining a shared Let’s Encrypt TLS certificate associated with the domain *.server21[.]org, they found 14 more IP addresses with the same digital fingerprint. These were hosted on Hetzner Online GmbH in Finland and several Iranian ISPs.

The infrastructure was dual-purposed. A configuration file showed a KCP-based packet tunnel using Paquet, an open-source tool that circumvents Iran’s internet filters. Encrypted traffic was forwarded from the Iranian server to a Hetzner exit node in Finland, indicating a commercial VPN relay service running alongside the attack setup.

Botnet Operations and Defensive Measures

The botnet’s infection strategy centered on a Python script named ohhhh.py, which opened multiple SSH sessions on target machines. Once connected, the bot client source code was compiled on the victim’s machine, evading traditional detection methods. The newly compiled binary, named hex, was unlikely to raise alarms during system checks.

Defensive recommendations include blocking identified IP addresses, monitoring for specific filenames and hashes, and strengthening SSH access controls. Immediate actions such as enforcing key-based authentication and limiting concurrent sessions can mitigate credential-driven attacks.

Security teams should also watch for unexpected gcc compilation activities, as this indicates potential on-host binary construction, a tactic used to bypass standard detection mechanisms.

Stay updated on cybersecurity developments by following us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant updates.

Cyber Security News Tags:3x-ui, ArvanCloud, Botnet, cyber threat, Cybersecurity, DDoS, Hetzner Online, Infrastructure, Iran, Iranian ISP, Leak, network security, open directory, Paquet, SSH

Post navigation

Previous Post: CISA Highlights SharePoint Security Vulnerability Exploitation
Next Post: Enhancing Security with Ceros for Claude Code

Related Posts

CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices Cyber Security News
AI Agents Excel in Marketplace, Reveal Key Challenges AI Agents Excel in Marketplace, Reveal Key Challenges Cyber Security News
Rise of Advanced EDR Killers in Ransomware Attacks Rise of Advanced EDR Killers in Ransomware Attacks Cyber Security News
Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally Cyber Security News
Critical Cisco Vulnerability Exposes SD-WAN to Attacks Critical Cisco Vulnerability Exposes SD-WAN to Attacks Cyber Security News
New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 40,000 Servers at Risk Due to cPanel Exploit
  • AI Accelerates Zero-Day Exploits, Increasing Cyber Risks
  • Instructure Faces Cyberattack, Data Breach Reported
  • Global Crypto Scam Crackdown: 276 Arrests, $701M Seized
  • Microsoft Defender Misidentifies DigiCert Certificates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 40,000 Servers at Risk Due to cPanel Exploit
  • AI Accelerates Zero-Day Exploits, Increasing Cyber Risks
  • Instructure Faces Cyberattack, Data Breach Reported
  • Global Crypto Scam Crackdown: 276 Arrests, $701M Seized
  • Microsoft Defender Misidentifies DigiCert Certificates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark