The Hacker News
thehackernews.com
خبر سيبراني: SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
المقال بالعربية
ما حدث:
Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. "The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of
لم يذكر المصدر تفاصيل إضافية حول الأطراف المتأثرة أو الأثر الفني الكامل.
لماذا يهم:
تمثل مثل هذه الأخبار مؤشرات مهمة لمتابعة التهديدات السيبرانية بشكل مستمر واتخاذ إجراءات احترازية مبكرة داخل المؤسسة.
إجراءات موصى بها:
مراجعة التحديثات الأمنية الرسمية، تطبيق التصحيحات المتاحة، تعزيز المراقبة، وتوعية الفرق بمخاطر التصيد والهندسة الاجتماعية.
المصدر: thehackernews.com - https://thehackernews.com/2026/02/sshstalker-botnet-uses-irc-c2-to.html
English Article
What happened:
Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. "The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of
The source did not provide additional details about impacted parties or technical scope.
Why it matters:
Items like this are important signals for tracking evolving cyber threats and improving defensive readiness.
Recommended actions:
Review official security updates, apply available patches, strengthen monitoring, and reinforce phishing awareness.
Source: thehackernews.com - https://thehackernews.com/2026/02/sshstalker-botnet-uses-irc-c2-to.html
Vulnerability
Read source