FERRAMENTAS LINUX: PumaBot: Discover a New Linux-Based IoT Botnet Targets SSH with Cryptojacking & Credential Theft

quarta-feira, 28 de maio de 2025

PumaBot: Discover a New Linux-Based IoT Botnet Targets SSH with Cryptojacking & Credential Theft

 

Security


PumaBot, a new Go-based IoT botnet, brute-forces SSH to deploy cryptominers & credential stealers. Learn how it evades detection, persists via systemd, and how to protect Linux devices from this high-risk threat.

A dangerous new Go-written botnet named PumaBot is actively targeting Linux-based IoT devices, exploiting weak SSH credentials to spread malware, deploy cryptojacking payloads, and steal sensitive data.

Security researchers at Darktrace uncovered this threat, noting its worm-like propagationpersistence mechanisms, and evasion tactics—making it a critical concern for enterprises and IoT manufacturers.

How PumaBot Works: SSH Brute-Force Attacks & Malware Delivery

PumaBot’s infection chain follows a multi-stage process:

  1. Target Acquisition – Instead of random scanning, it fetches a pre-selected IP list from its C2 server (ssh.ddos-cc[.]org).

  2. SSH Brute-Forcing – Uses credential stuffing against open SSH ports.

  3. Honeypot Detection – Checks for security traps (e.g., avoids systems with "Pumatronix" strings).

  4. Persistence & Payload Execution –

    • Masquerades as Redis or MySQL (mysqI.service with a capital "I").

    • Deploys cryptominers (XMRig, networkxm) and credential stealers (pam_unix.so).

    • Exfiltrates stolen data via /usr/bin/con.txt.

Key Malware Components

ComponentFunction
ddaemonGo-based backdoor fetching networkxm.
networkxmSSH brute-force tool (similar to botnet’s initial stage).
installx.shDownloads & executes jc.sh from 1.lusyn[.]xyz.
jc.shReplaces legitimate pam_unix.so with a malicious rootkit.
pam_unix.soLogs successful logins to /usr/bin/con.txt.
"1" binaryMonitors and exfiltrates stolen credentials.

Why PumaBot is a High-Risk Threat

  • Self-Propagating Worm Capabilities – Can spread rapidly across vulnerable networks.

  • Evasion Tactics – Mimics legitimate services (redis.service) to avoid detection.

  • Dual Monetization – Combines cryptojacking and credential theft for profit.

  • Systemd Abuse – Ensures survival after reboots.

How to Protect Your Systems

✅ Monitor SSH Logs – Detect failed login attempts.

✅ Audit authorized_keys – Remove unknown SSH keys.

✅ Harden Firewalls – Restrict SSH exposure & filter HTTP requests with unusual headers (X-API-KEY: jieruidashabi).
✅ Inspect Systemd Services – Check for rogue entries like redis.service or mysqI.service.

✅ Update Credentials – Enforce strong SSH passwords & key-based authentication.


"PumaBot represents a persistent, automated SSH threat that abuses Linux-native tools to maintain control over infected systems." — Darktrace

FAQs

Q: Is PumaBot targeting only IoT devices?

A: Primarily, but any Linux system with weak SSH security is at risk.

Q: Does it infect Windows or macOS?

A: No—it’s designed for Linux-based embedded systems.

Q: How can I detect PumaBot infections?

A: Look for:

  • Unusual redis or mysql services.

  • CPU spikes (indicating cryptomining).

  • Unknown files in /usr/src/bao/ or /lib/redis/.

Nenhum comentário:

Postar um comentário