Ethical Hacking News
SSHStalker, a new and previously undocumented Linux botnet, has emerged using old 2009-era exploits and IRC bots to infect approximately 7,000 systems. The botnet relies on mass-scanning malware and persistence mechanisms to maintain control without immediate DDoS or cryptomining activity. As defenders work to understand the threat landscape, it is essential to be aware of this new actor and its tactics.
The SSHStalker botnet has infected approximately 7,000 systems worldwide, primarily cloud servers with strong links to Oracle Cloud infrastructure. The botnet relies on Internet Relay Chat (IRC) as its command-and-control backbone and uses outdated 2009-era exploits, IRC bots, and mass-scanning malware to infect systems. The persistence mechanism implemented by the botnet is designed to be noisy but effective, using cron jobs that relaunch the malware within a minute if disrupted. Unlike typical botnets, SSHStalker focuses on long-term access rather than immediate Distributed Denial-of-Service (DDoS) or cryptomining activity. The exploit arsenal targets old Linux 2.6.x kernels using many 2009-2010 CVEs and is distinctive in its "dormant persistence" pattern, infecting systems without immediate monetization.
A new threat actor has emerged, utilizing a previously undocumented Linux botnet dubbed SSHStalker to target vulnerable systems around the world. According to researchers at Flare, the botnet is using old 2009-era exploits, IRC bots, and mass-scanning malware to infect approximately 7,000 systems, primarily cloud servers with strong links to Oracle Cloud infrastructure.
The SSHStalker botnet relies on Internet Relay Chat (IRC) as its command-and-control backbone, utilizing multiple C-based bots, Perl scripts, and known malware families like Tsunami and Keiten. The attackers employ a highly automated approach, chaining SSH scanners with rapid staging, on-host compilation, and automatic enrollment into IRC channels to scale infections quickly.
The persistence mechanism implemented by the botnet is designed to be noisy but effective, using cron jobs that relaunch the malware within about a minute if disrupted. The toolkit mixes log cleaners and rootkit-like artifacts with a large collection of outdated Linux 2.6.x kernel exploits, which remain effective against neglected legacy systems.
In contrast to typical botnets, SSHStalker shows no immediate Distributed Denial-of-Service (DDoS) or cryptomining activity. Instead, it focuses on long-term access, likely for staging, testing, or future use. Analysis of the staging server revealed a large, well-organized toolkit that mixes mass SSH compromise with dozens of IRC botnet components, SSH scanners, persistence scripts, rootkits, and Linux privilege escalation exploits.
The exploit arsenal focuses on old Linux 2.6.x kernels, using many 2009-2010 CVEs. While outdated, these exploits still work against neglected and legacy systems, indicating a toolkit ecosystem built around this era of Linux kernel vulnerabilities.
Researchers note that the SSHStalker operation is distinctive in its "dormant persistence" pattern, infecting systems and establishing control without immediate monetization. This behavior differentiates it from typical opportunistic botnet operations and suggests either infrastructure staging, testing phases, or strategic access retention for future use.
The researchers also point out that the toolkit mixes log cleaners and rootkit-like artifacts with a large collection of outdated Linux 2.6.x kernel exploits. Investigators found evidence of nearly 7,000 freshly compromised systems in January 2026, mostly cloud servers, with strong links to Oracle Cloud infrastructure spread across global regions.
The SSHStalker botnet is the latest addition to the growing threat landscape of Linux-based malware. As defenders and security professionals continue to monitor the situation, it is essential to be aware of this new threat actor and its tactics, as well as take steps to mitigate the risk of infection.
Related Information:
https://www.ethicalhackingnews.com/articles/A-New-Linux-Botnet-Emerge-The-SSHStalker-Threat-Landscape-ehn.shtml
Published: Wed Feb 11 04:25:35 2026 by llama3.2 3B Q4_K_M