The SSHStalker Linux botnet has ensnared 7,000 systems, deploying various scanners and malware, an IRC bot, and multiple kernel exploits.
A newly discovered botnet is compromising poorly-protected Linux servers by brute-forcing weak SSH password login authentication. Researchers at Canada-based Flare Systems, who discovered the botnet, ...
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations.
Dan Goodin warns of a “Linux botnet”: A security researcher has discovered a cluster of infected Linux servers that have been corralled into a special ops botnet of sorts and used to distribute ...
A botnet targeting Internet of Things devices running on the Linux operating system works by brute forcing credentials and downloading cryptomining software. See Also: Cracking the Code: Securing ...
A novel Go-based Linux botnet, dubbed "PumaBot," has been observed targeting Internet of Things (IoT) devices. PumaBot differentiates itself from typical botnets by remotely retrieving a list of ...
A botnet known as GoBruteforcer has been actively targeting Linux servers exposed to the internet, using large-scale brute-force attacks against common services such as FTP, MySQL, PostgreSQL and ...
Kali Linux vs. Parrot OS: Which security-forward distro is right for you?