HomeCyber SecurityNew PumaBot Botnet Targets Linux IoT Units to Steal SSH Credentials and...

New PumaBot Botnet Targets Linux IoT Units to Steal SSH Credentials and Mine Crypto


Might 28, 2025Ravie LakshmananIoT Safety / Cryptocurrency

New PumaBot Botnet Targets Linux IoT Units to Steal SSH Credentials and Mine Crypto

Embedded Linux-based Web of Issues (IoT) gadgets have change into the goal of a brand new botnet dubbed PumaBot.

Written in Go, the botnet is designed to conduct brute-force assaults in opposition to SSH situations to broaden in dimension and scale and ship extra malware to the contaminated hosts.

“Fairly than scanning the web, the malware retrieves an inventory of targets from a command-and-control (C2) server and makes an attempt to brute pressure SSH credentials,” Darktrace stated in an evaluation shared with The Hacker Information. “Upon gaining entry, it receives distant instructions and establishes persistence utilizing system service information.”

The botnet malware is designed to acquire preliminary entry by way of efficiently brute-forcing SSH credentials throughout an inventory of harvested IP addresses with open SSH ports. The checklist of IP addresses to focus on is retrieved from an exterior server (“ssh.ddos-cc[.]org”).

Cybersecurity

As a part of its brute-force makes an attempt, the malware additionally performs varied checks to find out if the system is appropriate and isn’t a honeypot. Moreover, it checks the presence of the string “Pumatronix,” a producer of surveillance and site visitors digicam techniques, indicating both an try and particularly single them out or exclude them.

The malware then proceeds to gather and exfiltrate primary system info to the C2 server, after which it units up persistence and executes instructions acquired from the server.

“The malware writes itself to /lib/redis, trying to disguise itself as a reputable Redis system file,” Darktrace stated. “It then creates a persistent systemd service in /and so on/systemd/system, named both redis.service or mysqI.service (word the spelling of mysql with a capital I) relying on what has been hardcoded into the malware.”

In doing so, it permits the malware to provide the impression that it is benign and in addition survive reboots. Two of the instructions executed by the botnet are “xmrig” and “networkxm” indicating that the compromised gadgets are getting used to mine cryptocurrency in a bootleg method.

Nevertheless, the instructions are launched with out specifying the complete paths, a facet that indicators that the payloads are doubtless downloaded or unpacked elsewhere on the contaminated host. Darktrace stated its evaluation of the marketing campaign uncovered different associated binaries which can be stated to be deployed as a part of a broader marketing campaign –

  • ddaemon, a Go-based backdoor which is retrieve the binary “networkxm” into “/usr/src/bao/networkxm” and execute the shell script “installx.sh”
  • networkxm, an SSH brute-force instrument that features just like the botnet’s preliminary stage by fetching a password checklist from a C2 server and makes an attempt to attach by way of SSH throughout an inventory of goal IP addresses
  • installx.sh, which is used to retrieve one other shell script “jc.sh” from “1.lusyn[.]xyz,” grant it learn, write, and execute permissions for all entry ranges, run the script, and clear bash historical past
  • jc.sh, which is configured to obtain a malicious “pam_unix.so” file from an exterior server and use it to switch the reputable counterpart put in on the machine, in addition to retrieve and run one other binary named “1” from the identical server
  • pam_unix.so, which acts as a rootkit that steals credentials by intercepting profitable logins and writing them to the file “/usr/bin/con.txt”
  • 1, which is used to watch for the file “con.txt” being written or moved to “/usr/bin/” after which exfiltrate its contents to the identical server
Cybersecurity

On condition that the SSH brute-force capabilities of the botnet malware lends it worm-like capabilities, customers are required to maintain a watch out for anomalous SSH login exercise, notably failed login makes an attempt, audit systemd providers frequently, assessment authorized_keys information for the presence of unknown SSH keys, apply strict firewall guidelines to restrict publicity, and filter HTTP requests with non-standard headers, corresponding to X-API-KEY: jieruidashabi.

“The botnet represents a persistent Go-based SSH risk that leverages automation, credential brute-forcing, and native Linux instruments to realize and preserve management over compromised techniques,” Darktrace stated.

“By mimicking reputable binaries (e.g., Redis), abusing systemd for persistence, and embedding fingerprinting logic to keep away from detection in honeypots or restricted environments, it demonstrates an intent to evade defenses.”

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments