Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems

SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems

Posted on February 11, 2026 By CWS

Cybersecurity experts have recently unveiled details about a sophisticated botnet known as SSHStalker, which employs the Internet Relay Chat (IRC) protocol for command-and-control (C2) operations. This new threat targets legacy Linux systems, exploiting older vulnerabilities that continue to exist within forgotten or outdated infrastructure.

Understanding SSHStalker’s Approach

According to cybersecurity firm Flare, SSHStalker employs a combination of stealth tactics and obsolete Linux exploits. These include log tampering tools and rootkits, which allow the botnet to avoid detection. Despite the age of the exploits, originally affecting Linux kernel versions from 2009 to 2010, they remain effective against neglected systems. The botnet uses an automated approach to identify and compromise vulnerable systems, incorporating them into IRC channels for control.

Mechanics and Tools Used

Unlike typical botnets that engage in activities like DDoS attacks or cryptocurrency mining, SSHStalker focuses on maintaining access and control without immediate post-exploitation actions. This dormant behavior suggests the infrastructure might be used for strategic purposes in the future. A key element of SSHStalker is its Golang-based scanner, which targets port 22 to identify open SSH servers, spreading rapidly in a worm-like manner. The attack toolkit includes various payloads, such as IRC-controlled bots and Perl scripts, which are designed to execute network flooding attacks and manage compromised bots.

The malware also employs C programs to clean SSH connection logs, erasing malicious activity traces to evade forensic analysis. Additionally, a “keep-alive” feature ensures the main malware process is quickly relaunched if terminated by defense mechanisms.

The Threat Actor and Potential Origins

Flare’s research into the botnet’s infrastructure revealed a vast array of offensive open-source tools and malware samples, including rootkits, cryptocurrency miners, and scripts for stealing AWS credentials. The presence of Romanian-style elements in IRC channels led researchers to suspect a Romanian origin for the threat actor, potentially linked to the Outlaw hacking group. This group is known for its disciplined operations and use of mature orchestration techniques, rather than developing new exploits or rootkits.

SSHStalker’s strategy demonstrates a focus on efficient mass compromise and long-term persistence across heterogeneous Linux environments, relying heavily on C language for core components and using shell scripts for orchestration and maintenance tasks.

As SSHStalker continues to exploit legacy systems, organizations are urged to review and update their cybersecurity measures to protect against this and similar threats. The reliance on outdated vulnerabilities underscores the importance of maintaining up-to-date security practices to prevent exploitation by advanced botnets like SSHStalker.

The Hacker News Tags:Botnet, Cybersecurity, Flare, Golang scanner, IRC, legacy exploits, Linux, Outlaw group, Rootkits, SSHStalker

Post navigation

Previous Post: Microsoft Addresses Teams Assignment Issues After Update Glitch
Next Post: GitGuardian Secures $50M to Enhance AI Identity Security

Related Posts

Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media The Hacker News
Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems The Hacker News
40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials 40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials The Hacker News
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business The Hacker News
HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands The Hacker News
Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News