By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
Computing

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

News Room
Last updated: 2026/02/11 at 6:35 AM
News Room Published 11 February 2026
Share
SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
SHARE

Ravie LakshmananFeb 11, 2026Linux / Botnet

Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes.

“The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of Linux 2.6.x-era exploits (2009–2010 CVEs),” cybersecurity company Flare said. “These are low value against modern stacks, but remain effective against ‘forgotten’ infrastructure and long-tail legacy environments.”

SSHStalker combines IRC botnet mechanics with an automated mass-compromise operation that uses an SSH scanner and other readily available scanners to co-opt susceptible systems into a network and enroll them in IRC channels.

However, unlike other campaigns that typically leverage such botnets for opportunistic efforts like distributed denial-of-service (DDoS) attacks, proxyjacking, or cryptocurrency mining, SSHStalker has been found to maintain persistent access without any follow-on post-exploitation behavior.

This dormant behavior sets it apart, raising the possibility that the compromised infrastructure is being used for staging, testing, or strategic access retention for future use.

A core component of SSHStalker is a Golang scanner that scans for port 22 for servers with open SSH in order to extend its reach in a worm-like fashion. Also dropped are several payloads, including variants of an IRC-controlled bot and a Perl file bot that connects to an UnrealIRCd IRC Server, joins a control channel, and waits for commands that allow it to carry out flood-style traffic attacks and commandeer the bots.

The attacks are also characterized by the execution of C program files to clean SSH connection logs and erase traces of malicious activity from logs to reduce forensic visibility. Furthermore, the malware toolkit contains a “keep-alive” component that ensures the main malware process is relaunched within 60 seconds in the event it’s terminated by a security tool.

SSHStalker is notable for blending mass compromise automation with a catalog of 16 distinct vulnerabilities impacting the Linux kernel, some going all the way back to 2009. Some of the flaws used in the exploit module are CVE-2009-2692, CVE-2009-2698, CVE-2010-3849, CVE-2010-1173, CVE-2009-2267, CVE-2009-2908, CVE-2009-3547, CVE-2010-2959, and CVE-2010-3437.

Flare’s investigation of the staging infrastructure associated with the threat actor has uncovered an extensive repository of open-source offensive tooling and previously published malware samples. These include – 

  • Rootkits to facilitate stealth and persistence
  • Cryptocurrency miners 
  • A Python script that executes a binary called “website grabber” to steal exposed Amazon Web Services (AWS) secrets from targeted websites
  • EnergyMech, an IRC bot that provides C2 and remote command execution capabilities

It’s suspected that the threat actor behind the activity could be of Romanian origin, given the presence of “Romanian-style nicknames, slang patterns, and naming conventions inside IRC channels and configuration wordlists.” What’s more, the operational fingerprint exhibits strong overlaps with that of a hacking group known as Outlaw (aka Dota).

“SSHStalker does not appear to focus on novel exploit development but instead demonstrates operational control through mature implementation and orchestration, by primarily using C for core bot and low-level components, shell for orchestration and persistence, and limited Python and Perl usage mainly for utility or supporting automation tasks inside the attack chain and running the IRCbot,” Flare said.

“The threat actor is not developing zero-days or novel rootkits, but demonstrating strong operational discipline in mass compromise workflows, infrastructure recycling, and long-tail persistence across heterogeneous Linux environments.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Apple Watch Ultra 3 vs TAG Heuer Connected E5: which is the best luxury smartwatch? Apple Watch Ultra 3 vs TAG Heuer Connected E5: which is the best luxury smartwatch?
Next Article Some of the Year’s Best Mattress Sales Are on Presidents’ Day—Here’s What We Recommend Some of the Year’s Best Mattress Sales Are on Presidents’ Day—Here’s What We Recommend
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Wallpaper Wednesday: More great phone wallpapers for all to share (February 11)
Wallpaper Wednesday: More great phone wallpapers for all to share (February 11)
News
Czechia’s policy on China: Swinging between engagement and de-risking
Czechia’s policy on China: Swinging between engagement and de-risking
News
We’re one step closer to knowing why there’s life on Earth – and nowhere else
We’re one step closer to knowing why there’s life on Earth – and nowhere else
News
EU to take action against Meta for blocking third-party AI assistants on WhatsApp
EU to take action against Meta for blocking third-party AI assistants on WhatsApp
Mobile

You Might also Like

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
Computing

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

3 Min Read
Linux 7.0 Now Defaults To Intel TSX Auto Mode For Performance Benefits On Newer CPUs
Computing

Linux 7.0 Now Defaults To Intel TSX Auto Mode For Performance Benefits On Newer CPUs

2 Min Read
Agents, OpenAI, deepfakes, and the messy reality of the AI boom: A conversation with Oren Etzioni
Computing

Agents, OpenAI, deepfakes, and the messy reality of the AI boom: A conversation with Oren Etzioni

7 Min Read
Intel Releases New Compute Runtime, Upstreams More SYCL Code To LLVM
Computing

Intel Releases New Compute Runtime, Upstreams More SYCL Code To LLVM

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?