Cyberessentials: Technology MagazineCyberessentials: Technology MagazineCyberessentials: Technology Magazine
  • Tech news
  • PC & Hardware
  • Mobile
  • Gadget
  • Guides
  • Security
  • Gaming
  • Crypto
Search
  • Contact
  • Cookie Policy
  • Terms of Use
© 2025 Cyberessentials.org. All Rights Reserved.
Reading: New PumaBot botnet attacks Linux IoT devices with stealthy SSH brute-force tactics
Share
Notification Show More
Font ResizerAa
Cyberessentials: Technology MagazineCyberessentials: Technology Magazine
Font ResizerAa
  • Gadget
  • Technology
  • Mobile
Search
  • Tech news
  • PC & Hardware
  • Mobile
  • Gadget
  • Guides
  • Security
  • Gaming
  • Crypto
Follow US
  • Contact
  • Cookie Policy
  • Terms of Use
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Security

New PumaBot botnet attacks Linux IoT devices with stealthy SSH brute-force tactics

Last updated: June 6, 2025 3:55 pm
Cyberessentials.org
Share
SHARE

A new botnet named PumaBot is quietly taking over Linux-based IoT devices worldwide. Unlike other botnets, it doesn’t randomly attack the internet. Instead, it uses precise tactics to breach security cameras, routers, and smart gadgets. Here’s what you need to know.

Contents
  • What makes PumaBot different?
  • How PumaBot sneaks into devices
  • What happens after infection?
  • Why your old security camera is at risk
  • How to protect your devices

What makes PumaBot different?

Most botnets send login attempts to random IP addresses. PumaBot, on the other hand, is smarter. It gets its target lists from its command center (ssh.ddos-cc[.]org), then attacks those devices with SSH password guesses. It’s like a burglar targeting houses with known weak locks.

“This isn’t some kid in a basement randomly attacking devices,” says a cybersecurity analyst. “PumaBot operators are professionals using military-style reconnaissance.”

How PumaBot sneaks into devices

The attack unfolds in three steps:

Step 1: The fake ID check
Before attacking, PumaBot checks if a device is real. It looks for the string “Pumatronix” – a known maker of traffic cameras. This suggests attackers target specific gear or avoid decoy systems.

Step 2: The camouflage
Once inside, PumaBot disguises itself as Redis database software. It hides in /lib/redis and creates fake system services named redis.service or mysqI.service (with a capital I to trick admins).

Step 3: The backdoor
The botnet plants its own SSH key in the authorized_keys file. Even if you delete the malware, this secret key lets attackers waltz back in anytime.

What happens after infection?

Compromised devices become crypto-mining slaves and data thieves. Darktrace researchers found PumaBot:

• Runs XMRig software to mine Monero cryptocurrency
• Installs rootkits that steal login credentials
• Uses networkxm tool for more SSH attacks
• Exfiltrates stolen data through Chinese domains like lusyn[.]xyz

The most disturbing component? A malicious pam_unix.so file that intercepts every successful login. Stolen passwords get saved to /usr/bin/con.txt before being sent to attackers.

Why your old security camera is at risk

PumaBot targets two common IoT weaknesses:

1. Default passwords: Many devices never change factory-set logins like admin/admin
2. Outdated software: Manufacturers often stop updating devices after 2-3 years

“Your grandma’s internet-connected thermostat could be mining crypto right now,” jokes a reddit user discussing the botnet. The scary truth? They’re not entirely wrong.

How to protect your devices

Cybersecurity experts recommend four key steps:

1. Change default passwords: Make new credentials at least 12 characters with mixed symbols
2. Block SSH from the internet: Use VPNs for remote access instead of open ports
3. Hunt for fake services: Check /etc/systemd/system for suspicious entries
4. Monitor SSH logs: Look for repeated failed login attempts from strange locations

As PumaBot continues evolving, one thing’s clear: IoT security can’t be an afterthought anymore. Your smart fridge might just be the weakest link in your digital life.

US Hackers Reportedly “Turned Off the Lights” in Venezuela to Capture Maduro
Apple doubles bug bounty rewards to $2 million for critical security flaws
Discord faces ransom demands after massive government ID breach
ClayRat spyware spreads like wildfire through fake Android apps
Discord suffers major data breach exposing government IDs
Share This Article
Facebook Copy Link Print
Share
Previous Article Vpn software logo What is a VPN? VPN meaning
Next Article ethical hacker working in cybersecurity in front of computers 10 Most Popular Cybersecurity Certifications That Will Boost Your Career in 2025
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

AWS Discounts for Startups: How to Lower Cloud Spend Early
Guides WWW
black flat screen computer monitor
Programming languages – compiled vs. interpreted. What are the differences?
WWW
green plant in clear glass cup
Best Ways to Double Dip on Cashback and Credit Card Rewards
Guides
assorted-color apparel lot
Best Ways to Save Money Shopping for Kids’ Clothes Online
Guides
100 us dollar bill
How I Saved $500 This Year Doing Absolutely Nothing at Checkout
Guides
a person using a laptop computer with a qr code on the screen
Why Your Promo Codes Never Work (And How to Fix It)
Guides
a hundred dollar bill sticking out of the back pocket of a pair of jeans
The Ultimate Guide to Earning Rewards on Online Purchases
Guides
A green iPhone sitting on top of a wooden table
How to Save on DoorDash and UberEats Orders Every Time – Use Coupons
Guides

							banner							
							banner
Cyberessentials.org
Discover the latest in technology: expert PC & hardware guides, mobile innovations, AI breakthroughs, and security best practices. Join our community of tech enthusiasts today!

Recommended

a man is typing on a computer keyboard
What Is Caret Browsing and How Does It Work?
Guides
Youtube application
How to Search for Words in a YouTube Video
Guides
black ipad with keyboard on white table
Surface Laptop 4 Yellow Screen Issue
Guides PC & Hardware
men's blue collared top near silver MacBook
Why Can I Hear Myself In My Headset
Guides
Is Cybersecurity Hard? 10 Tips for Success
Security
The youtube logo on a smartphone is visible.
YouTube launches powerful AI detection tool to fight deepfake epidemic
AI News
a white cube with a yellow and blue logo on it
Best Python courses for beginners
WWW
black DSLR camera
How To Tell If Camera Has IR Filter?
Guides
Is Bybit Legit? Exchange Safety Analysis
Crypto
Stranger Things signage
When does season 5 of Stranger Things come out
Guides

You Might also Like

low angle photo of flag of U.S.A
NewsSecurity

US government sounds alarm over massive Cisco firewall hack attack

Cyberessentials.org
7 Min Read
a group of red sim cards sitting on top of a wooden table
NewsSecurity

Massive SIM farm Discovered Near UN Could Have Shut Down NYC Cell Service

Cyberessentials.org
10 Min Read
person holding smartphone
MobileSecurity

Is imei.info safe?

Cyberessentials.org
21 Min Read
macbook pro on brown wooden tablewith logo of nordvpn
SecuritySoftware

NordVPN Review: How well does it perform?

Cyberessentials.org
24 Min Read
a computer screen displaying a stock market chart
CryptoSecurity

Best Security Practices for Cryptocurrency Exchange

Cyberessentials.org
29 Min Read
black smartphone near person
Security

Do Social Workers Make More Than Cybersecurity Specialists? A Deep Dive

Cyberessentials.org
23 Min Read
laptop
PC & HardwareSecurity

The 10 Best Laptops for Cybersecurity Professionals

Cyberessentials.org
45 Min Read
city skyline during night time
Security

Top 20 Cybersecurity Companies in Ireland

Cyberessentials.org
27 Min Read
white and brown city buildings during daytime
Security

Popular Cities for Cybersecurity Jobs in 2025

Cyberessentials.org
26 Min Read
//

Discover the latest in technology: expert PC & hardware guides, mobile innovations, AI breakthroughs, and security best practices. Join our community of tech enthusiasts today!

Categories

  • AI
  • Crypto
  • Gadget
  • Gaming
  • Guides
  • Marketing
  • Mobile
  • News
  • PC & Hardware
  • Security
  • Software
  • Technology
  • Uncategorized
  • WWW

Recent Articles

  • AWS Discounts for Startups: How to Lower Cloud Spend Early
  • Programming languages – compiled vs. interpreted. What are the differences?
  • Best Ways to Double Dip on Cashback and Credit Card Rewards
  • Best Ways to Save Money Shopping for Kids’ Clothes Online
  • How I Saved $500 This Year Doing Absolutely Nothing at Checkout

Support

  • PRIVACY POLICY
  • TERMS OF USE
  • COOKIE POLICY
  • OUR SITE MAP
  • CONTACT US
Cyberessentials: Technology MagazineCyberessentials: Technology Magazine
© 2025 Cyberessentials.org. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?