Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Rapid SSH Worm Exploits Linux Systems with Credential Stuffing

Rapid SSH Worm Exploits Linux Systems with Credential Stuffing

Posted on February 12, 2026 By CWS

A new and highly efficient self-propagating worm has been detected, capable of compromising Linux systems through SSH brute-force attacks in a mere four seconds. This threat leverages a combination of traditional credential stuffing and advanced cryptographic command verification, forming a rapidly spreading botnet that preys on devices with weak authentication.

How the Worm Exploits Vulnerabilities

The worm’s ability to exploit unchanged default passwords highlights ongoing vulnerabilities in systems, especially within Internet of Things (IoT) devices like Raspberry Pi. Once the worm gains access through weak credentials, a small bash script, only 4.7 kilobytes in size, is uploaded and executed. This script secures the system by establishing persistence, removing rival malware, and connecting the device to a command and control network via Internet Relay Chat (IRC).

Discovery and Propagation Patterns

Researchers at the Internet Storm Center identified this malicious activity through DShield honeypot sensors designed to detect SSH attacks. The worm was traced back to a compromised Raspberry Pi in Germany, which had fallen victim to the same attack chain. The botnet’s worm-like propagation enables it to rapidly infiltrate vulnerable systems, amplifying its reach across the internet.

The attack initiates when the malware authenticates using common default credentials, predominantly targeting Raspberry Pi devices. After accessing the system, the script modifies files and schedules tasks to maintain control, eliminating processes associated with competing threats such as botnets and cryptocurrency miners.

Advanced Security Features

Setting this worm apart is its use of cryptographically signed command verification. Embedded RSA public keys ensure that only validated commands from the command and control operator are executed, safeguarding compromised devices from unauthorized access. Once established, the malware connects to various IRC networks, waiting for further commands in a specific channel named “#biret.”

The worm escalates its spread by installing scanning tools like Zmap and sshpass, enabling scans of 100,000 random IP addresses. This aggressive approach underscores the importance of securing networks against such threats.

Prevention and Security Measures

Organizations can mitigate these risks by disabling password-based SSH authentication in favor of key-based methods. Further security can be achieved by removing default user accounts on devices like Raspberry Pi, deploying tools like fail2ban to protect against brute-force attacks, and isolating IoT devices from critical network infrastructure through segmentation.

Stay updated with the latest security news by following us on Google News, LinkedIn, and X. Set CSN as your preferred source on Google to ensure instant updates.

Cyber Security News Tags:Botnet, brute-force attacks, credential stuffing, Cybersecurity, IoT security, Linux vulnerability, Malware, network security, Raspberry Pi, SSH security

Post navigation

Previous Post: Odido Telecom Hacked: 6.2 Million Accounts Compromised
Next Post: Feiniu NAS Devices Targeted in Major Botnet Attack

Related Posts

NVIDIA GPU Display Driver Vulnerabilities Allows Code Execution and Privilege Escalation NVIDIA GPU Display Driver Vulnerabilities Allows Code Execution and Privilege Escalation Cyber Security News
WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls Cyber Security News
Magento Vulnerability Exploited for Remote Code Execution Magento Vulnerability Exploited for Remote Code Execution Cyber Security News
BlackSuit Ransomware Actors Breached Corporate Environment, Including 60+ VMware ESXi hosts BlackSuit Ransomware Actors Breached Corporate Environment, Including 60+ VMware ESXi hosts Cyber Security News
Sweet Security Brings Runtime-CNAPP Power to Windows Sweet Security Brings Runtime-CNAPP Power to Windows Cyber Security News
Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark