By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Cyberessentials: Technology MagazineCyberessentials: Technology MagazineCyberessentials: Technology Magazine
  • Tech news
  • PC & Hardware
  • Mobile
  • Gadget
  • Guides
  • Security
  • Gaming
Search
  • Contact
  • Cookie Policy
  • Terms of Use
© 2025 Cyberessentials.org. All Rights Reserved.
Reading: New PumaBot botnet attacks Linux IoT devices with stealthy SSH brute-force tactics
Share
Notification Show More
Font ResizerAa
Cyberessentials: Technology MagazineCyberessentials: Technology Magazine
Font ResizerAa
  • Gadget
  • Technology
  • Mobile
Search
  • Tech news
  • PC & Hardware
  • Mobile
  • Gadget
  • Guides
  • Security
  • Gaming
Follow US
  • Contact
  • Cookie Policy
  • Terms of Use
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Security

New PumaBot botnet attacks Linux IoT devices with stealthy SSH brute-force tactics

Last updated: June 6, 2025 3:55 pm
Cyberessentials.org
Share
SHARE

A new botnet named PumaBot is quietly taking over Linux-based IoT devices worldwide. Unlike other botnets, it doesn’t randomly attack the internet. Instead, it uses precise tactics to breach security cameras, routers, and smart gadgets. Here’s what you need to know.

Contents
What makes PumaBot different?How PumaBot sneaks into devicesWhat happens after infection?Why your old security camera is at riskHow to protect your devices

What makes PumaBot different?

Most botnets send login attempts to random IP addresses. PumaBot, on the other hand, is smarter. It gets its target lists from its command center (ssh.ddos-cc[.]org), then attacks those devices with SSH password guesses. It’s like a burglar targeting houses with known weak locks.

“This isn’t some kid in a basement randomly attacking devices,” says a cybersecurity analyst. “PumaBot operators are professionals using military-style reconnaissance.”

How PumaBot sneaks into devices

The attack unfolds in three steps:

Step 1: The fake ID check
Before attacking, PumaBot checks if a device is real. It looks for the string “Pumatronix” – a known maker of traffic cameras. This suggests attackers target specific gear or avoid decoy systems.

Step 2: The camouflage
Once inside, PumaBot disguises itself as Redis database software. It hides in /lib/redis and creates fake system services named redis.service or mysqI.service (with a capital I to trick admins).

Step 3: The backdoor
The botnet plants its own SSH key in the authorized_keys file. Even if you delete the malware, this secret key lets attackers waltz back in anytime.

What happens after infection?

Compromised devices become crypto-mining slaves and data thieves. Darktrace researchers found PumaBot:

• Runs XMRig software to mine Monero cryptocurrency
• Installs rootkits that steal login credentials
• Uses networkxm tool for more SSH attacks
• Exfiltrates stolen data through Chinese domains like lusyn[.]xyz

The most disturbing component? A malicious pam_unix.so file that intercepts every successful login. Stolen passwords get saved to /usr/bin/con.txt before being sent to attackers.

Why your old security camera is at risk

PumaBot targets two common IoT weaknesses:

1. Default passwords: Many devices never change factory-set logins like admin/admin
2. Outdated software: Manufacturers often stop updating devices after 2-3 years

“Your grandma’s internet-connected thermostat could be mining crypto right now,” jokes a reddit user discussing the botnet. The scary truth? They’re not entirely wrong.

How to protect your devices

Cybersecurity experts recommend four key steps:

1. Change default passwords: Make new credentials at least 12 characters with mixed symbols
2. Block SSH from the internet: Use VPNs for remote access instead of open ports
3. Hunt for fake services: Check /etc/systemd/system for suspicious entries
4. Monitor SSH logs: Look for repeated failed login attempts from strange locations

As PumaBot continues evolving, one thing’s clear: IoT security can’t be an afterthought anymore. Your smart fridge might just be the weakest link in your digital life.

Apple doubles bug bounty rewards to $2 million for critical security flaws
Discord faces ransom demands after massive government ID breach
ClayRat spyware spreads like wildfire through fake Android apps
Discord suffers major data breach exposing government IDs
US government sounds alarm over massive Cisco firewall hack attack
Share This Article
Facebook Copy Link Print
Share
Previous Article Vpn software logo What is a VPN? VPN meaning
Next Article ethical hacker working in cybersecurity in front of computers 10 Most Popular Cybersecurity Certifications That Will Boost Your Career in 2025
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

a close up of a laptop on a desk
OpenAI’s Sora video app breaks records with 1 million downloads in under 5 days
AI News
a group of colorful objects
Chrome fights notification spam with automatic permission removal
News Software
Google’s Pixel Watch 4 earns perfect repairability crown from iFixit
Gadget News
A tall building with a microsoft logo on top of it
Microsoft unveils world’s first GB300 supercomputer cluster for OpenAI
AI News Technology
a spacex rocket is flying in the sky
Falling SpaceX satellites are turning into fireballs every day
News Technology
person in black and white hoodie holding rifle
Black Ops 7 ditches SBMM and brings back persistent lobbies
Gaming
a white cube with a yellow and blue logo on it
Best Python courses for beginners
WWW
Intel’s Xe3 graphics revolution promises to change mobile gaming forever
PC & Hardware
banner banner
Cyberessentials.org
Discover the latest in technology: expert PC & hardware guides, mobile innovations, AI breakthroughs, and security best practices. Join our community of tech enthusiasts today!

You Might also Like

a group of red sim cards sitting on top of a wooden table
NewsSecurity

Massive SIM farm Discovered Near UN Could Have Shut Down NYC Cell Service

Cyberessentials.org
10 Min Read
person holding smartphone
MobileSecurity

Is imei.info safe?

Cyberessentials.org
21 Min Read
macbook pro on brown wooden tablewith logo of nordvpn
SecuritySoftware

NordVPN Review: How well does it perform?

Cyberessentials.org
24 Min Read
a computer screen displaying a stock market chart
CryptoSecurity

Best Security Practices for Cryptocurrency Exchange

Cyberessentials.org
29 Min Read
black smartphone near person
Security

Do Social Workers Make More Than Cybersecurity Specialists? A Deep Dive

Cyberessentials.org
23 Min Read
laptop
PC & HardwareSecurity

The 10 Best Laptops for Cybersecurity Professionals

Cyberessentials.org
45 Min Read
city skyline during night time
Security

Top 20 Cybersecurity Companies in Ireland

Cyberessentials.org
27 Min Read
white and brown city buildings during daytime
Security

Popular Cities for Cybersecurity Jobs in 2025

Cyberessentials.org
26 Min Read
black and silver laptop computer
Security

20 Free Cybersecurity Summer Programs for High Schoolers in 2025

Cyberessentials.org
23 Min Read
//

Discover the latest in technology: expert PC & hardware guides, mobile innovations, AI breakthroughs, and security best practices. Join our community of tech enthusiasts today!

Categories

  • AI
  • Crypto
  • Gadget
  • Gaming
  • Guides
  • Marketing
  • Mobile
  • News
  • PC & Hardware
  • Security
  • Software
  • Technology
  • WWW

Recent Articles

  • OpenAI’s Sora video app breaks records with 1 million downloads in under 5 days
  • Chrome fights notification spam with automatic permission removal
  • Google’s Pixel Watch 4 earns perfect repairability crown from iFixit
  • Apple doubles bug bounty rewards to $2 million for critical security flaws
  • Microsoft unveils world’s first GB300 supercomputer cluster for OpenAI

Support

  • PRIVACY POLICY
  • TERMS OF USE
  • COOKIE POLICY
  • OUR SITE MAP
  • CONTACT US
Cyberessentials: Technology MagazineCyberessentials: Technology Magazine
© 2025 Cyberessentials.org. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?