The Hacker News thehackernews.com

خبر سيبراني: SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

المقال بالعربية

ما حدث: Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. "The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of لم يذكر المصدر تفاصيل إضافية حول الأطراف المتأثرة أو الأثر الفني الكامل. لماذا يهم: تمثل مثل هذه الأخبار مؤشرات مهمة لمتابعة التهديدات السيبرانية بشكل مستمر واتخاذ إجراءات احترازية مبكرة داخل المؤسسة. إجراءات موصى بها: مراجعة التحديثات الأمنية الرسمية، تطبيق التصحيحات المتاحة، تعزيز المراقبة، وتوعية الفرق بمخاطر التصيد والهندسة الاجتماعية. المصدر: thehackernews.com - https://thehackernews.com/2026/02/sshstalker-botnet-uses-irc-c2-to.html

English Article

What happened: Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on the Internet Relay Chat (IRC) communication protocol for command-and-control (C2) purposes. "The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of The source did not provide additional details about impacted parties or technical scope. Why it matters: Items like this are important signals for tracking evolving cyber threats and improving defensive readiness. Recommended actions: Review official security updates, apply available patches, strengthen monitoring, and reinforce phishing awareness. Source: thehackernews.com - https://thehackernews.com/2026/02/sshstalker-botnet-uses-irc-c2-to.html
Vulnerability
Read source