SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. "The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of
AI Analysis
Technical Summary
SSHStalker is a sophisticated botnet operation targeting Linux systems by leveraging a catalog of legacy kernel exploits dating back to 2009-2010. It uses an IRC-based command-and-control (C2) infrastructure, specifically connecting compromised hosts to UnrealIRCd servers and joining control channels to receive commands. The botnet employs a Golang-based SSH scanner that probes port 22 to identify vulnerable Linux servers with open SSH access. Upon successful exploitation, the malware deploys multiple payloads including IRC bots and Perl scripts that facilitate remote command execution and flood-style attacks. The toolkit includes rootkit-class artifacts and log cleaners that tamper with utmp, wtmp, and lastlog files to erase forensic evidence, enhancing stealth. A keep-alive component ensures the malware process is relaunched within 60 seconds if terminated, increasing persistence against security tools. SSHStalker’s exploitation module covers 16 distinct Linux kernel vulnerabilities (e.g., CVE-2009-2692, CVE-2010-3849), which are ineffective against modern systems but remain potent against legacy or poorly maintained infrastructure. Unlike many botnets that immediately monetize compromised hosts via DDoS or cryptomining, SSHStalker maintains a dormant presence, indicating possible use for staging, testing, or strategic long-term access retention. The threat actor’s operational profile shows strong discipline in mass compromise workflows, infrastructure recycling, and heterogeneous Linux environment persistence. Indicators suggest a Romanian origin, with overlaps to the Outlaw (aka Dota) hacking group. The actor uses a combination of C for core components, shell scripting for orchestration, and Python/Perl for auxiliary tasks, relying on mature, publicly available exploits and open-source offensive tooling rather than zero-day vulnerabilities or novel rootkits.
Potential Impact
For European organizations, SSHStalker poses a significant risk primarily to legacy Linux infrastructure that remains unpatched or unsupported. Critical systems running outdated kernels are vulnerable to compromise, potentially allowing attackers to maintain stealthy, persistent access. This can lead to unauthorized control over servers, enabling future strategic operations such as espionage, lateral movement, or staging for more destructive attacks. The botnet’s log tampering and rootkit capabilities hinder incident detection and forensic investigations, increasing dwell time and complicating response efforts. Although no immediate post-exploitation monetization (e.g., cryptomining or DDoS) has been observed, the dormant nature of the botnet suggests potential for future misuse, which could disrupt services or compromise sensitive data. European organizations with legacy Linux deployments in sectors such as critical infrastructure, government, telecommunications, and academia are particularly at risk. The stealth and persistence features increase the likelihood of long-term undetected presence, amplifying potential damage and operational disruption.
Mitigation Recommendations
European organizations should conduct comprehensive audits to identify Linux systems running legacy kernels vulnerable to exploits from 2009-2010 and prioritize patching or upgrading these systems to supported, secure versions. Deploy network segmentation to isolate legacy infrastructure and restrict SSH access using strict firewall rules and multi-factor authentication to reduce exposure. Implement enhanced monitoring for unusual SSH scanning activity and IRC traffic patterns, including deep packet inspection to detect IRC-based C2 communications. Employ host-based intrusion detection systems (HIDS) capable of detecting rootkit artifacts and log tampering attempts, complemented by integrity monitoring of critical log files (utmp, wtmp, lastlog). Regularly review and harden SSH configurations, disable unused services, and enforce strict access controls. Establish incident response playbooks specific to Linux kernel exploits and botnet infections, including forensic readiness to detect stealthy persistence mechanisms. Consider deploying deception technologies or honeypots mimicking vulnerable legacy systems to detect attacker reconnaissance and exploitation attempts. Finally, educate system administrators on the risks of legacy infrastructure and the importance of timely patch management and system decommissioning.
Affected Countries
Romania, Germany, France, United Kingdom, Italy, Netherlands, Poland, Spain
SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
Description
Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. "The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of
AI-Powered Analysis
Technical Analysis
SSHStalker is a sophisticated botnet operation targeting Linux systems by leveraging a catalog of legacy kernel exploits dating back to 2009-2010. It uses an IRC-based command-and-control (C2) infrastructure, specifically connecting compromised hosts to UnrealIRCd servers and joining control channels to receive commands. The botnet employs a Golang-based SSH scanner that probes port 22 to identify vulnerable Linux servers with open SSH access. Upon successful exploitation, the malware deploys multiple payloads including IRC bots and Perl scripts that facilitate remote command execution and flood-style attacks. The toolkit includes rootkit-class artifacts and log cleaners that tamper with utmp, wtmp, and lastlog files to erase forensic evidence, enhancing stealth. A keep-alive component ensures the malware process is relaunched within 60 seconds if terminated, increasing persistence against security tools. SSHStalker’s exploitation module covers 16 distinct Linux kernel vulnerabilities (e.g., CVE-2009-2692, CVE-2010-3849), which are ineffective against modern systems but remain potent against legacy or poorly maintained infrastructure. Unlike many botnets that immediately monetize compromised hosts via DDoS or cryptomining, SSHStalker maintains a dormant presence, indicating possible use for staging, testing, or strategic long-term access retention. The threat actor’s operational profile shows strong discipline in mass compromise workflows, infrastructure recycling, and heterogeneous Linux environment persistence. Indicators suggest a Romanian origin, with overlaps to the Outlaw (aka Dota) hacking group. The actor uses a combination of C for core components, shell scripting for orchestration, and Python/Perl for auxiliary tasks, relying on mature, publicly available exploits and open-source offensive tooling rather than zero-day vulnerabilities or novel rootkits.
Potential Impact
For European organizations, SSHStalker poses a significant risk primarily to legacy Linux infrastructure that remains unpatched or unsupported. Critical systems running outdated kernels are vulnerable to compromise, potentially allowing attackers to maintain stealthy, persistent access. This can lead to unauthorized control over servers, enabling future strategic operations such as espionage, lateral movement, or staging for more destructive attacks. The botnet’s log tampering and rootkit capabilities hinder incident detection and forensic investigations, increasing dwell time and complicating response efforts. Although no immediate post-exploitation monetization (e.g., cryptomining or DDoS) has been observed, the dormant nature of the botnet suggests potential for future misuse, which could disrupt services or compromise sensitive data. European organizations with legacy Linux deployments in sectors such as critical infrastructure, government, telecommunications, and academia are particularly at risk. The stealth and persistence features increase the likelihood of long-term undetected presence, amplifying potential damage and operational disruption.
Mitigation Recommendations
European organizations should conduct comprehensive audits to identify Linux systems running legacy kernels vulnerable to exploits from 2009-2010 and prioritize patching or upgrading these systems to supported, secure versions. Deploy network segmentation to isolate legacy infrastructure and restrict SSH access using strict firewall rules and multi-factor authentication to reduce exposure. Implement enhanced monitoring for unusual SSH scanning activity and IRC traffic patterns, including deep packet inspection to detect IRC-based C2 communications. Employ host-based intrusion detection systems (HIDS) capable of detecting rootkit artifacts and log tampering attempts, complemented by integrity monitoring of critical log files (utmp, wtmp, lastlog). Regularly review and harden SSH configurations, disable unused services, and enforce strict access controls. Establish incident response playbooks specific to Linux kernel exploits and botnet infections, including forensic readiness to detect stealthy persistence mechanisms. Consider deploying deception technologies or honeypots mimicking vulnerable legacy systems to detect attacker reconnaissance and exploitation attempts. Finally, educate system administrators on the risks of legacy infrastructure and the importance of timely patch management and system decommissioning.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/02/sshstalker-botnet-uses-irc-c2-to.html","fetched":true,"fetchedAt":"2026-02-11T12:13:29.588Z","wordCount":1129}
Threat ID: 698c726b4b57a58fa193ba9b
Added to database: 2/11/2026, 12:13:31 PM
Last enriched: 2/11/2026, 12:14:27 PM
Last updated: 2/11/2026, 6:29:32 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
WSL in the Malware Ecosystem, (Wed, Feb 11th)
LowWarlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server
Mediumglibc 2.38 - Buffer Overflow
MediumWindows 10.0.17763.7009 - spoofing vulnerability
MediumVoidLink: Dissecting an AI-Generated C2 Implant
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.