Article Details

Scrape Timestamp (UTC): 2025-05-28 12:36:51.317

Source: https://thehackernews.com/2025/05/new-pumabot-botnet-targets-linux-iot.html

Original Article Text

Click to Toggle View

New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto. Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot. Written in Go, the botnet is designed to conduct brute-force attacks against SSH instances to expand in size and scale and deliver additional malware to the infected hosts. "Rather than scanning the internet, the malware retrieves a list of targets from a command-and-control (C2) server and attempts to brute force SSH credentials," Darktrace said in an analysis shared with The Hacker News. "Upon gaining access, it receives remote commands and establishes persistence using system service files." The botnet malware is designed to obtain initial access via successfully brute-forcing SSH credentials across a list of harvested IP addresses with open SSH ports. The list of IP addresses to target is retrieved from an external server ("ssh.ddos-cc[.]org"). As part of its brute-force attempts, the malware also performs various checks to determine if the system is suitable and is not a honeypot. Furthermore, it checks the presence of the string "Pumatronix," a manufacturer of surveillance and traffic camera systems, indicating either an attempt to specifically single them out or exclude them. The malware then proceeds to collect and exfiltrate basic system information to the C2 server, after which it sets up persistence and executes commands received from the server. "The malware writes itself to /lib/redis, attempting to disguise itself as a legitimate Redis system file," Darktrace said. "It then creates a persistent systemd service in /etc/systemd/system, named either redis.service or mysqI.service (note the spelling of mysql with a capital I) depending on what has been hardcoded into the malware." In doing so, it allows the malware to give the impression that it's benign and also survive reboots. Two of the commands executed by the botnet are "xmrig" and "networkxm" indicating that the compromised devices are being used to mine cryptocurrency in an illicit manner. However, the commands are launched without specifying the full paths, an aspect that signals that the payloads are likely downloaded or unpacked elsewhere on the infected host. Darktrace said its analysis of the campaign uncovered other related binaries that are said to be deployed as part of a broader campaign - Given that the SSH brute-force capabilities of the botnet malware lends it worm-like capabilities, users are required to keep an eye out for anomalous SSH login activity, particularly failed login attempts, audit systemd services regularly, review authorized_keys files for the presence of unknown SSH keys, apply strict firewall rules to limit exposure, and filter HTTP requests with non-standard headers, such as X-API-KEY: jieruidashabi. "The botnet represents a persistent Go-based SSH threat that leverages automation, credential brute-forcing, and native Linux tools to gain and maintain control over compromised systems," Darktrace said. "By mimicking legitimate binaries (e.g., Redis), abusing systemd for persistence, and embedding fingerprinting logic to avoid detection in honeypots or restricted environments, it demonstrates an intent to evade defenses."

Daily Brief Summary

MALWARE // PumaBot Botnet Attacks Linux IoT Devices to Mine Crypto and Steal Data

PumaBot, a new botnet targeting Linux IoT devices, conducts brute-force attacks on SSH instances to expand and deliver malware.

The malware obtains lists of potential victim IP addresses from a command-and-control server and checks systems for suitability and honeypot avoidance.

Upon successful SSH credentials compromise, it establishes persistence using spoofed system service files like "redis.service" or "mysqI.service" to avoid detection.

PumaBot is utilized for illicit cryptocurrency mining using commands like "xmrig" and "networkxm" on compromised devices.

The botnet mimics legitimate system files and uses native Linux tools for persistence, demonstrating sophisticated evasion techniques against security defenses.

Analysis highlights an increase in SSH brute-force attacks, suggesting a rise in IoT-related cyber threats.

Recommendations for mitigation include monitoring SSH logs for unusual activity, maintaining strict firewall rules, and verifying system files and services for unauthorized changes.