OSINT - New Linux/Rakos threat: devices and servers under SSH scan (again)
OSINT - New Linux/Rakos threat: devices and servers under SSH scan (again)
AI Analysis
Technical Summary
The reported threat concerns a new Linux malware variant associated with the Rakos family, identified through OSINT sources and observed performing SSH scans on devices and servers. Rakos malware is known for targeting Linux systems, often aiming to compromise devices by brute forcing or exploiting SSH services to gain unauthorized access. The scanning activity indicates an attempt to identify vulnerable SSH endpoints, which could then be leveraged for further malicious activities such as deploying backdoors, establishing botnets, or conducting lateral movement within networks. Although the information is limited and no specific vulnerabilities or exploits are detailed, the presence of active scanning suggests ongoing reconnaissance efforts by threat actors. The malware targets Linux-based platforms, which are widely used in server environments, embedded devices, and IoT infrastructure. The threat level is reported as low, and no known exploits in the wild have been confirmed, indicating that while the scanning activity is notable, it has not yet escalated into widespread successful compromises. The absence of affected versions and patch links further suggests this is an emerging reconnaissance phase rather than an active exploitation campaign. The technical details show a moderate threat and analysis level, reinforcing the need for vigilance but not immediate alarm.
Potential Impact
For European organizations, the primary impact of this threat lies in the potential unauthorized access to Linux servers and devices via SSH. Successful compromise could lead to data breaches, service disruptions, or the inclusion of infected devices in botnets used for distributed denial-of-service (DDoS) attacks or other malicious operations. Given the widespread use of Linux in critical infrastructure, cloud services, and enterprise environments across Europe, even low-severity threats can escalate if left unmitigated. The reconnaissance activity may precede more targeted attacks, increasing risk over time. Organizations with exposed SSH services, especially those with weak authentication mechanisms, are at higher risk. The threat could affect confidentiality through data exfiltration, integrity via unauthorized modifications, and availability if systems are co-opted for malicious purposes. However, the current low severity and lack of known exploits suggest limited immediate impact but warrant proactive defense measures.
Mitigation Recommendations
European organizations should implement robust SSH security practices beyond generic advice. This includes enforcing key-based authentication while disabling password authentication to prevent brute force attacks. Employing multi-factor authentication (MFA) for SSH access adds an additional security layer. Network-level controls such as restricting SSH access to known IP addresses via firewall rules or VPN tunnels can reduce exposure. Continuous monitoring and alerting on unusual SSH login attempts or scanning activity are critical for early detection. Deploying intrusion detection/prevention systems (IDS/IPS) tuned for SSH anomalies can help identify reconnaissance and attack attempts. Regularly updating Linux systems and SSH server software ensures known vulnerabilities are patched, even though no specific exploits are reported here. Additionally, organizations should audit and minimize the number of exposed SSH endpoints, especially on IoT and embedded devices, which may lack robust security controls. Implementing honeypots or deception technologies can also help detect and analyze attacker behavior related to Rakos scanning activities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
OSINT - New Linux/Rakos threat: devices and servers under SSH scan (again)
Description
OSINT - New Linux/Rakos threat: devices and servers under SSH scan (again)
AI-Powered Analysis
Technical Analysis
The reported threat concerns a new Linux malware variant associated with the Rakos family, identified through OSINT sources and observed performing SSH scans on devices and servers. Rakos malware is known for targeting Linux systems, often aiming to compromise devices by brute forcing or exploiting SSH services to gain unauthorized access. The scanning activity indicates an attempt to identify vulnerable SSH endpoints, which could then be leveraged for further malicious activities such as deploying backdoors, establishing botnets, or conducting lateral movement within networks. Although the information is limited and no specific vulnerabilities or exploits are detailed, the presence of active scanning suggests ongoing reconnaissance efforts by threat actors. The malware targets Linux-based platforms, which are widely used in server environments, embedded devices, and IoT infrastructure. The threat level is reported as low, and no known exploits in the wild have been confirmed, indicating that while the scanning activity is notable, it has not yet escalated into widespread successful compromises. The absence of affected versions and patch links further suggests this is an emerging reconnaissance phase rather than an active exploitation campaign. The technical details show a moderate threat and analysis level, reinforcing the need for vigilance but not immediate alarm.
Potential Impact
For European organizations, the primary impact of this threat lies in the potential unauthorized access to Linux servers and devices via SSH. Successful compromise could lead to data breaches, service disruptions, or the inclusion of infected devices in botnets used for distributed denial-of-service (DDoS) attacks or other malicious operations. Given the widespread use of Linux in critical infrastructure, cloud services, and enterprise environments across Europe, even low-severity threats can escalate if left unmitigated. The reconnaissance activity may precede more targeted attacks, increasing risk over time. Organizations with exposed SSH services, especially those with weak authentication mechanisms, are at higher risk. The threat could affect confidentiality through data exfiltration, integrity via unauthorized modifications, and availability if systems are co-opted for malicious purposes. However, the current low severity and lack of known exploits suggest limited immediate impact but warrant proactive defense measures.
Mitigation Recommendations
European organizations should implement robust SSH security practices beyond generic advice. This includes enforcing key-based authentication while disabling password authentication to prevent brute force attacks. Employing multi-factor authentication (MFA) for SSH access adds an additional security layer. Network-level controls such as restricting SSH access to known IP addresses via firewall rules or VPN tunnels can reduce exposure. Continuous monitoring and alerting on unusual SSH login attempts or scanning activity are critical for early detection. Deploying intrusion detection/prevention systems (IDS/IPS) tuned for SSH anomalies can help identify reconnaissance and attack attempts. Regularly updating Linux systems and SSH server software ensures known vulnerabilities are patched, even though no specific exploits are reported here. Additionally, organizations should audit and minimize the number of exposed SSH endpoints, especially on IoT and embedded devices, which may lack robust security controls. Implementing honeypots or deception technologies can also help detect and analyze attacker behavior related to Rakos scanning activities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Threat Level
- 3
- Analysis
- 2
- Original Timestamp
- 1482398934
Threat ID: 682acdbdbbaf20d303f0b903
Added to database: 5/19/2025, 6:20:45 AM
Last enriched: 7/2/2025, 6:13:08 PM
Last updated: 8/15/2025, 5:56:52 AM
Views: 11
Related Threats
ThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumThreatFox IOCs for 2025-08-15
MediumBuilding a Free Library for Phishing & Security Awareness Training — Looking for Feedback!
LowThreatFox IOCs for 2025-08-14
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.