Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Elite SOCs Operationalize Threat Intelligence: 3 Tactics
May 19, 2026
DirtyDecrypt Linux Kernel PoC Exploit Code Vulnerability Released
May 19, 2026
Malware Campaign Delivers Crypto Clipper via JS, PS
May 19, 2026
Home/Threats/Legacy IRC Botnet Leverages SSH to Compromise Campaign Uses
Threats

Legacy IRC Botnet Leverages SSH to Compromise Campaign Uses

A newly discovered Linux botnet, dubbed SSHStalker, revives Internet Relay Chat (IRC) for its command and control operations. It leverages automation to compromise target servers over SSH. It mainly...

David kimber
David kimber
February 11, 2026 3 Min Read
5 0

A newly discovered Linux botnet, dubbed SSHStalker, revives Internet Relay Chat (IRC) for its command and control operations. It leverages automation to compromise target servers over SSH.

It mainly succeeds by guessing weak or reused passwords, then turning each host into a launchpad for more scans and installs.

In honeypot intrusions seen in early 2026, attackers dropped a Golang binary named “nmap” that actually probes port 22 to find new targets.

They then pulled down GCC, compiled small C files, and unpacked layered archives such as GS and bootbou.tgz to deploy IRC bots and helper tools.

Staging data also referenced almost 7,000 fresh SSH scan results from January 2026, including many IPs in large cloud hosting ranges.

An ASCII art found in one of the files of the threat actor (Source - Flare)
An ASCII art found in one of the files of the threat actor (Source – Flare)

Flare researchers identified this cluster as previously undocumented after checking its samples, flow, and infrastructure against public reporting and common malware collections.

They described the operation as scale-first, built from stitched-together components that prioritize uptime and low cost over stealth, and repeatability across Linux builds.

They noted “dormant persistence,” with systems enrolled in control channels even when little operator tasking was visible.

The “SSHStalker’s attack flow” tracks the build-and-run pipeline, including multiple IRC bot variants written in C and Perl and redundant servers and channels.

SSHStalker’s attack flow (Source - Flare)
SSHStalker’s attack flow (Source – Flare)

The same kit also compiles log cleaners that target shell history and utmp/wtmp/lastlog records, and it carries older Linux 2.6.x exploits that can still work on forgotten machines.

Persistence that snaps back

Persistence is blunt but effective: SSHStalker records its working directory and adds a cron job that runs every minute to execute an update watchdog.

If defenders kill the main process, the script checks a PID file and restarts the runner, often restoring control within about 60 seconds.

This fast recovery means responders must remove every part of the kit, or the bot returns before incident work is finished.

While the “Indicators of Compromise” shows the practical fix: remove the one-minute cron entry, delete the full kit directory (often in /dev/shm), and hunt for services or init scripts added by the “distro” helper.

To prevent re-entry, disable SSH password authentication, enforce key-based access, rate-limit brute-force attempts, and restrict SSH exposure to trusted networks.

On hosts, alert on unexpected GCC or make runs from user directories, /tmp, or /dev/shm, and on new binaries that execute minutes after compilation.

At the network edge, watch for IRC client registration and channel joins, and use egress filtering so servers cannot keep long-lived outbound TCP sessions to unknown IRC infrastructure.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

MSHTML 0-Day Vulnerability Lets Attackers Bypass Framework Security

Next Post

Threat Actors Use ChatGPT, Grok & Google Weaponize Leverages

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical PostgreSQL Flaws Allow Code Execution & SQL
May 19, 2026
Critical Apache Flink Vulnerability Enables Remote code execution
May 19, 2026
Hackers Hijack Four-Faith Industrial Routers for Hijacking Botnet
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us