Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Wireshark Flaws Allow Code Execution via Malformed
May 1, 2026
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Home/Threats/Iran-Linked Botnet Exposed After Open Directory Leak Reveals
Threats

Iran-Linked Botnet Exposed After Open Directory Leak Reveals

The complete working infrastructure of an Iran-linked threat actor is now exposed, offering researchers an unprecedented look into a live botnet operation. This significant leak occurred after the...

Marcus Rodriguez
Marcus Rodriguez
March 19, 2026 4 Min Read
0 0

The complete working infrastructure of an Iran-linked threat actor is now exposed, offering researchers an unprecedented look into a live botnet operation. This significant leak occurred after the actor carelessly left an open directory on their own staging server.

The leak revealed a 15-node relay network, a mass SSH deployment framework, DDoS tooling compiled on victim machines, and a bot client with a hardcoded command-and-control (C2) address still actively under development.​

The exposure surfaced on February 24, 2026, when a server at IP 185.221.239[.]162, hosted on infrastructure registered to Dade Samane Fanava Company (PJS), an Iranian ISP, was flagged during routine scanning.

The server contained 449 files across 59 subdirectories, including a tunnel configuration file, Python-based deployment scripts, compiled DDoS binaries, C-language denial-of-service source files, and a credential list used to target victim systems via SSH.​

Open directory file manager in AttackCapture (Source - Hunt.io)
Open directory file manager in AttackCapture (Source – Hunt.io)

Hunt.io analysts identified the exposed server during a routine review of Iranian-hosted infrastructure using their AttackCapture™ feature, which indexes open directories across the internet.

By pivoting on a shared Let’s Encrypt TLS certificate tied to the wildcard domain *.server21[.]org, researchers uncovered 14 additional IP addresses sharing the same fingerprint — seven hosted on Hetzner Online GmbH in Finland, and seven registered to Iranian ISPs including Dade Samane Fanava Company (PJS) and Sindad Network Technology PJSC. The domain was registered in 2023, with DNS routed through ArvanCloud (arvancdn[.]ir), an Iranian CDN provider.​

Certificate associations sharing the same fingerprint (Source - Hunt.io)
Certificate associations sharing the same fingerprint (Source – Hunt.io)

The same infrastructure served a dual purpose. A configuration file named config-client.yaml described a KCP-based packet tunnel using Paqet — an open-source tool built to get around Iran’s national internet filtering system — where the Iranian server forwarded encrypted traffic to a Hetzner exit node in Finland.

The presence of 3x-ui, a web-based proxy panel with user account management and traffic quotas, pointed toward a commercially operated VPN relay service running alongside the attack infrastructure.​

An exposed bash history file laid out the operator’s working session across three distinct phases: tunnel deployment, DDoS tooling development, and botnet buildout.

Inline code comments written in Farsi and raw Arabic-script characters from keyboard input errors confirmed the actor is likely Iran-based.

Snippet of the bash history recovered in AttackCapture (Source - Hunt.io)
Snippet of the bash history recovered in AttackCapture (Source – Hunt.io)

DDoS targets in the history included a FiveM GTA server at 5.42.223[.]60 on port 30120 and two HTTP/HTTPS-facing hosts, with custom C tools — syn.c, flood.c, and au.c — alongside MHDDOS cloned from GitHub and compiled directly on the staging host.​

SSH-Driven Mass Deployment

The core of this botnet’s infection method was a Python script called ohhhh.py, which read credentials formatted as host:port|username|password and opened 500 concurrent SSH sessions against victim machines at once.

Once a session was live, the bot client source file cnc.c was pulled from the staging server, compiled on the victim machine using gcc -pthread, and launched in a detached screen session.

This on-host compilation tactic was a clear move to sidestep binary detection, since no pre-built executable is ever transferred, making standard hash-based scanning largely useless against it.

The compiled binary was renamed hex on infected hosts — a bland name unlikely to trigger alerts during a routine system check. ​

Botnet deployment (Source - Hunt.io)
Botnet deployment (Source – Hunt.io)

The bot client, self-labeled BOT CLIENT v1.0, registered each newly infected host with a beacon carrying the victim’s IP address, hostname, and process ID as UnknownBOT ONLINE.

The binary’s built-in reconnection logic means infected machines will keep trying to reach the C2 even if the staging server goes offline.

A secondary script, yse.py, served as a kill switch, letting the operator wipe all running sessions remotely by running pkill -9 screen across every infected host.​

Defenders should block all identified IP addresses tied to this operation and monitor for the specific filenames and SHA-256 hashes linked to ohhhh.py, yse.py, and the cnc binary.

Hardening SSH access — by enforcing key-based authentication, disabling root login, and restricting concurrent sessions — directly counters the credential-driven method this actor relied on.

Teams should also flag unexpected gcc compilation activity on servers, as on-host binary building is a significant indicator that standard binary-level detections may not catch this type of threat.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

CISA Warns: Microsoft SharePoint Vulnerability Actively

Next Post

Backdoored Open VSX Extension Deploys RAT Used GitHub

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Targeted Large-Scale Campaign Attacking U.S. Organizations with
April 30, 2026
Popular Python Package ‘lightning’ Hacked in Supply Chain
April 30, 2026
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us