Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
Home/Threats/DShield Captures Self-Propagating SSH Worm Expl Sensor Exploit
Threats

DShield Captures Self-Propagating SSH Worm Expl Sensor Exploit

DShield sensors have detected a sophisticated, self-propagating worm capable of fully compromising Linux systems in just four seconds via SSH brute-force attacks. This rapidly spreading threat,...

Sarah simpson
Sarah simpson
February 12, 2026 3 Min Read
0 0

DShield sensors have detected a sophisticated, self-propagating worm capable of fully compromising Linux systems in just four seconds via SSH brute-force attacks. This rapidly spreading threat, analyzed in detail as “Four Seconds to Botnet,” has prompted warnings from security researchers. Further technical deep dives are available, including a SANS Internet Storm Center diary and a report from OffSec’s Radar platform.

This new threat combines traditional credential stuffing techniques with modern cryptographic command verification, creating a fast-moving botnet that specifically targets devices with weak authentication mechanisms.

The attack demonstrates how vulnerable systems remain when default passwords are left unchanged, particularly on Internet of Things devices like Raspberry Pi computers.

The malware operates with remarkable efficiency, completing its entire attack lifecycle within seconds of initial contact.

Once an attacker gains access through weak credentials, a compact bash script measuring just 4.7 kilobytes gets uploaded and executed immediately.

This script establishes multiple layers of persistence, eliminates competing malware processes, and connects the compromised device to command and control infrastructure using Internet Relay Chat networks.

Internet Storm Center researchers identified this threat after analyzing traffic captured by DShield honeypot sensors deployed specifically to detect SSH-based attacks.

The investigation revealed that the malware originated from a compromised Raspberry Pi device in Germany, which was itself a victim of the same attack chain.

Network diagram of observed attack (Source – Internet Storm Center)

This worm-like propagation pattern allows the botnet to spread exponentially across vulnerable systems connected to the internet.​​

The attack begins when the malware successfully authenticates using common default credentials, particularly targeting Raspberry Pi devices with username “pi” and passwords like “raspberry” or “raspberryraspberry993311”.

After gaining access, the script immediately creates persistence mechanisms through modified system files and scheduled tasks.

It then kills processes associated with competing botnets and cryptocurrency miners, ensuring exclusive control over system resources.

Advanced Command Verification Through Cryptographic Signatures

What distinguishes this particular threat from typical SSH worms is its implementation of cryptographically signed command verification.

The malware contains an embedded RSA public key that validates all instructions received from the command and control operator before execution. This security measure prevents unauthorized parties from hijacking compromised devices within the botnet.

After establishing persistence, the compromised device joins multiple IRC networks across different geographic locations.

The bot connects to a specific channel named “#biret” where it awaits further instructions.

To propagate further, the malware installs scanning tools including Zmap and sshpass on each infected system, enabling the worm to conduct rapid port scans across 100,000 random IP addresses.

Organizations can protect themselves by disabling password-based SSH authentication and implementing key-based authentication instead.

Additional defenses include removing default user accounts on Raspberry Pi devices, deploying fail2ban for brute-force protection, and implementing network segmentation to isolate IoT devices from critical infrastructure.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

DragonForce Ransomware Targets 363 Companies with Cart

Next Post

Feiniu NAS Infected by Netdragon Botnet Exploiting Un

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us