SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
Briefly

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
""The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of Linux 2.6.x-era exploits (2009-2010 CVEs)," cybersecurity company Flare said. "These are low value against modern stacks, but remain effective against 'forgotten' infrastructure and long-tail legacy environments." SSHStalker combines IRC botnet mechanics with an automated mass-compromise operation that uses an SSH scanner and other readily available scanners to co-opt susceptible systems into a network and enroll them in IRC channels."
"Also dropped are several payloads, including variants of an IRC-controlled bot and a Perl file bot that connects to an UnrealIRCd IRC Server, joins a control channel, and waits for commands that allow it to carry out flood-style traffic attacks and commandeer the bots. The attacks are also characterized by the execution of C program files to clean SSH connection logs and erase traces of malicious activity from logs to reduce forensic visibility."
SSHStalker is an IRC-based botnet and mass-compromise operation that uses a Golang SSH scanner and other scanners to propagate in a worm-like fashion. The toolkit deploys IRC-controlled bots, a Perl bot for UnrealIRCd, and payloads capable of flood-style attacks, while emphasizing persistence rather than immediate monetization. The operation includes log cleaners (utmp/wtmp/lastlog tampering), rootkit-class artifacts, and C programs to erase SSH connection traces, reducing forensic visibility. The actor maintains a back-catalog of Linux 2.6-era exploits targeting legacy or forgotten infrastructure. Dormant compromise behavior suggests staging, testing, or long-term strategic access retention.
Read at The Hacker News
Unable to calculate read time
[
|
]