Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

John Thrasher, former Florida president and state president, John Thrasher, died at the age of 81.

We Gov’t and Google will face off in the Search Monopoly Case | Technology News

Has the Palestinian state been derailed by an illegal Israeli settlement? |News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » New Pumabot Botnet Target Linux IoT devices to steal SSH credentials and mine cryptography
Identity

New Pumabot Botnet Target Linux IoT devices to steal SSH credentials and mine cryptography

userBy userMay 28, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 28, 2025Ravi LakshmananIoT Security/Cryptocurrency

pumabot botnet

Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet called Pumabot.

The botnet written in GO is designed to carry out brute force attacks on SSH instances to expand size and scale and provide additional malware to infected hosts.

“Malware does not scan the internet, but instead retrieves a list of targets from a command and control (C2) server and forces SSH credentials to force them to force them,” Darktrace said in an analysis shared with Hacker News. “When access is obtained, it receives a remote command and establishes persistence using the system services file.”

Botnet malware is designed to obtain initial access by successfully enhancing SSH credentials across a list of harvested IP addresses with open SSH ports. The list of IP addresses to the target is obtained from an external server (“ssh.ddos-cc[.]org “).

Cybersecurity

As part of a brute force attempt, the malware performs various checks to determine whether the system is appropriate and not a honeypot. Additionally, it shows attempts to check for the presence of the string “Pumatronix”, the manufacturer of surveillance and traffic camera systems, and to specifically single or exclude them.

The malware then collects basic system information and excludes it on the C2 server, then sets persistence and executes commands received from the server.

“Malware is trying to write itself to /lib /redis and disguise itself into a legitimate Redis system file,” says Darktrace. “Next, create a permanent SystemD service in /etc/systemd/system. This is either Redis.Service or MySqi.Service (notes the Capital I spelling) depending on what’s hardcoded in Malware.”

This will give the impression that the malware is benign and will survive the reboot. Two of the commands executed by the botnet are “xmrig” and “networkxm”, indicating that the compromised devices are being used to illegally mine cryptocurrency.

However, the command is invoked without specifying a full path. This is an aspect that indicates that the payload is likely to be downloaded or unpacked elsewhere in the infected host. Darktrace said the campaign’s analysis revealed other related binaries that are said to be deployed as part of a broader campaign.

ddaemon gets the binary “Networkxm” in “/usr/src/bao/networkxm” and the binary “Networkxm” in the shell script “installx.sh “networkxm”. Get another shell script “Jc.sh” from “1.Lusyn”[.]XYZ, “Allow all access levels to read, write, execute, script, and clear bash history JC.sh. Intercept successful logins and write them to a file “/usr/bin/con.txt” 1.

Cybersecurity

Given that the SSH brute force feature of botnet malware provides worm-like functionality, users need to review the approval_keys file to audit the auditable system on a regular basis, especially the failed attempts of rolgy. X-API-KEY: Jieruidashabi.

“Botnets represent a permanent GO-based SSH threat that leverages compromised systems with automated, credentials and native Linux tools.

“It demonstrates its intention to mimic legal binaries (e.g. Redis), abuse SystemD for persistence, and embed fingerprint logic to avoid detection in honeypots and restricted environments.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHarvard agrees to abandon early photos of slaves
Next Article Atomic Canyon wants to become Chatgupt for the nuclear industry
user
  • Website

Related Posts

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

May 30, 2025

China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks

May 30, 2025

Healthcare CISO’s journey to enable modern care

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

John Thrasher, former Florida president and state president, John Thrasher, died at the age of 81.

We Gov’t and Google will face off in the Search Monopoly Case | Technology News

Has the Palestinian state been derailed by an illegal Israeli settlement? |News

Education Secretary says NY discriminates against schools along with Native American mascots

Trending Posts

We Gov’t and Google will face off in the Search Monopoly Case | Technology News

May 30, 2025

Has the Palestinian state been derailed by an illegal Israeli settlement? |News

May 30, 2025

From students to technology: How US-China ties slide despite tariff ceasefire | Trade War News

May 30, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Where LLMS retrieves real-time data behind AI searches (and why it’s more important than you think)

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

zircuit allows for top-up of non-curative wallets for crypto.com visa cards

Digital Health Startup Omada Health targets IPO’s $1.1 billion valuation as a virtual care rebound

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.