New Linux botnet SSHStalker uses old-school IRC for C2 comms
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住关键点。 文章讲的是一个名为SSHStalker的新Linux僵尸网络,它使用IRC协议进行命令和控制。IRC协议虽然老了,但技术社区还是喜欢它的简单和低带宽需求。SSHStalker用传统的IRC机制,比如多个C语言机器人和多服务器/频道冗余,注重弹性和成本而非隐蔽性。 攻击方式方面,它通过自动化SSH扫描和暴力破解进入系统,然后在受感染的主机上下载GCC编译有效载荷。传播机制有点像蠕虫,利用受感染的机器继续扫描更多目标。研究人员发现它主要针对Oracle云基础设施。 持久化方面,它使用每分钟运行的cron作业来检查和重新启动主进程。此外,它还利用了16个旧的CVE漏洞来提升权限,并包含加密挖矿和DDoS功能。 防御建议包括监控编译器安装、检测IRC连接、限制SSH密码认证等。 现在我需要把这些信息浓缩到100字以内。重点包括:僵尸网络名称、使用IRC、攻击方式(SSH扫描、暴力破解)、传播机制、利用旧CVE、持久化方法(cron)、功能(挖矿、DDoS)、防御建议。 可能的结构:介绍僵尸网络及其使用的协议;攻击方式;传播机制;利用旧漏洞;持久化方法;功能;防御建议。 现在试着组织语言: “Linux僵尸网络SSHStalker使用IRC协议进行控制。通过自动化SSH扫描和暴力破解入侵系统,并在受感染主机上编译有效载荷。采用蠕虫式传播机制,主要针对云服务提供商。利用16个旧CVE漏洞提升权限,并通过每分钟cron作业维持持久化。具备加密挖矿和潜在DDoS能力。” 这样大约是80字左右,符合要求。 </think> Linux僵尸网络SSHStalker使用IRC协议进行控制。通过自动化SSH扫描和暴力破解入侵系统,并在受感染主机上编译有效载荷。采用蠕虫式传播机制,主要针对云服务提供商。利用16个旧CVE漏洞提升权限,并通过每分钟cron作业维持持久化。具备加密挖矿和潜在DDoS能力。 2026-2-10 23:15:23 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

New Linux botnet SSHStalker uses old-school IRC for C2 comms

A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations.

The protocol was invented in 1988, and its adoption peaked during the 1990s, becoming the main text-based instant messaging solution for group and private communication.

Technical communities still appreciate it for its implementation simplicity, interoperability, low bandwidth requirements, and no need for a GUI.

Wiz

The SSHStalker botnet relies on classic IRC mechanics such as multiple C-based bots and multi-server/channel redundancy instead of modern C2 frameworks, prioritizing resilience, scale, and low cost over stealth and technical novelty.

According to researchers at threat intelligence company Flare, this approach extends to other characteristics of SSHStalker’s operation, like using noisy SSH scans, one-minute cron jobs, and a large back-catalog of 15-year old CVEs.

“What we actually found was a loud, stitched-together botnet kit that mixes old-school IRC control, compiling binaries on hosts, mass SSH compromise, and cron-based persistence. In other words scale-first operation that favors reliability over stealth,” Flare says.

The 'infected machines' IRC channel
The 'infected machines' IRC channel
Source: Flare

SSHStalker achieves initial access through automated SSH scanning and brute forcing, using a Go binary that masquerades as the popular open-source network discovery utility nmap.

Compromised hosts are then used to scan for additional SSH targets, which resembles a worm-like propagation mechanism for the botnet.

Flare found a file with results from nearly 7,000 bot scans, all from January, and focused mostly on cloud hosting providers in Oracle Cloud infrastructure.

Once SSHStalker infects a host, it downloads the GCC tool for compiling payloads on the victim device for better portability and evasion.

The first payloads are C-based IRC bots with hard-coded C2 servers and channels, which enroll the new victim in the botnet’s IRC infrastructure.

Next, the malware fetches archives named GS and bootbou, which contain bot variants for orchestration and execution sequencing.

Persistence is achieved via cron jobs that run every 60 seconds, invoking a watchdog-style update mechanism that checks whether the main bot process is running and relaunches it if it is terminated.

The botnet also contains exploits for 16 CVEs targeting Linux kernel versions from the 2009-2010 era. This is used to escalate privileges after the earlier brute-forcing step grants access to a low-privileged user.

Attack chain overview
Attack chain overview
Source: Flare

Regarding monetization, Flare noticed that the botnet performs AWS key harvesting and website scanning. It also includes cryptomining kits such as the high-performance Ethereum miner PhoenixMiner.

Distributed denial-of-service (DDoS) capabilities are also present, though the researchers noted they have not yet observed any such attacks. In fact, SSHStalker’s bots currently just connect to the C2 and then enter an idle state, suggesting testing or access hoarding for now.

Flare has not attributed SSHStalker to a particular threat group, though it noted similarities with the Outlaw/Maxlas botnet ecosystem and various Romanian indicators.

The threat intelligence company suggests placing monitoring solutions for compiler installation and execution on production servers, and alerts for IRC-style outbound connections. Cron jobs with short execution cycles from unusual paths are also big red flags.

Mitigation recommendations include disabling SSH password authentication, removing compilers from production images, enforcing egress filtering, and restricting execution from ‘/dev/shm.’

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/new-linux-botnet-sshstalker-uses-old-school-irc-for-c2-comms/
如有侵权请联系:admin#unsafe.sh