Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

0
Medium
Exploitlinux
Published: Wed Feb 11 2026 (02/11/2026, 09:56:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. "The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of

AI-Powered Analysis

AILast updated: 02/11/2026, 12:14:27 UTC

Technical Analysis

SSHStalker is a sophisticated botnet operation targeting Linux systems by leveraging a catalog of legacy kernel exploits dating back to 2009-2010. It uses an IRC-based command-and-control (C2) infrastructure, specifically connecting compromised hosts to UnrealIRCd servers and joining control channels to receive commands. The botnet employs a Golang-based SSH scanner that probes port 22 to identify vulnerable Linux servers with open SSH access. Upon successful exploitation, the malware deploys multiple payloads including IRC bots and Perl scripts that facilitate remote command execution and flood-style attacks. The toolkit includes rootkit-class artifacts and log cleaners that tamper with utmp, wtmp, and lastlog files to erase forensic evidence, enhancing stealth. A keep-alive component ensures the malware process is relaunched within 60 seconds if terminated, increasing persistence against security tools. SSHStalker’s exploitation module covers 16 distinct Linux kernel vulnerabilities (e.g., CVE-2009-2692, CVE-2010-3849), which are ineffective against modern systems but remain potent against legacy or poorly maintained infrastructure. Unlike many botnets that immediately monetize compromised hosts via DDoS or cryptomining, SSHStalker maintains a dormant presence, indicating possible use for staging, testing, or strategic long-term access retention. The threat actor’s operational profile shows strong discipline in mass compromise workflows, infrastructure recycling, and heterogeneous Linux environment persistence. Indicators suggest a Romanian origin, with overlaps to the Outlaw (aka Dota) hacking group. The actor uses a combination of C for core components, shell scripting for orchestration, and Python/Perl for auxiliary tasks, relying on mature, publicly available exploits and open-source offensive tooling rather than zero-day vulnerabilities or novel rootkits.

Potential Impact

For European organizations, SSHStalker poses a significant risk primarily to legacy Linux infrastructure that remains unpatched or unsupported. Critical systems running outdated kernels are vulnerable to compromise, potentially allowing attackers to maintain stealthy, persistent access. This can lead to unauthorized control over servers, enabling future strategic operations such as espionage, lateral movement, or staging for more destructive attacks. The botnet’s log tampering and rootkit capabilities hinder incident detection and forensic investigations, increasing dwell time and complicating response efforts. Although no immediate post-exploitation monetization (e.g., cryptomining or DDoS) has been observed, the dormant nature of the botnet suggests potential for future misuse, which could disrupt services or compromise sensitive data. European organizations with legacy Linux deployments in sectors such as critical infrastructure, government, telecommunications, and academia are particularly at risk. The stealth and persistence features increase the likelihood of long-term undetected presence, amplifying potential damage and operational disruption.

Mitigation Recommendations

European organizations should conduct comprehensive audits to identify Linux systems running legacy kernels vulnerable to exploits from 2009-2010 and prioritize patching or upgrading these systems to supported, secure versions. Deploy network segmentation to isolate legacy infrastructure and restrict SSH access using strict firewall rules and multi-factor authentication to reduce exposure. Implement enhanced monitoring for unusual SSH scanning activity and IRC traffic patterns, including deep packet inspection to detect IRC-based C2 communications. Employ host-based intrusion detection systems (HIDS) capable of detecting rootkit artifacts and log tampering attempts, complemented by integrity monitoring of critical log files (utmp, wtmp, lastlog). Regularly review and harden SSH configurations, disable unused services, and enforce strict access controls. Establish incident response playbooks specific to Linux kernel exploits and botnet infections, including forensic readiness to detect stealthy persistence mechanisms. Consider deploying deception technologies or honeypots mimicking vulnerable legacy systems to detect attacker reconnaissance and exploitation attempts. Finally, educate system administrators on the risks of legacy infrastructure and the importance of timely patch management and system decommissioning.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/sshstalker-botnet-uses-irc-c2-to.html","fetched":true,"fetchedAt":"2026-02-11T12:13:29.588Z","wordCount":1129}

Threat ID: 698c726b4b57a58fa193ba9b

Added to database: 2/11/2026, 12:13:31 PM

Last enriched: 2/11/2026, 12:14:27 PM

Last updated: 2/11/2026, 6:29:32 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats