A newly discovered malware campaign dubbed πΎ PumaBot is actively targeting Linux-based IoT devices, using Go-based tooling to perform SSH brute-force attacks and install cryptominers on compromised systems.
πͺ Initial Access
Instead of scanning the internet for vulnerable hosts, PumaBot connects to a C2 server (ssh.ddos-cc[.]org
) to retrieve a list of IP addresses with open SSH ports. It then attempts to brute-force login credentials and gains remote access to the systems.
Once inside, PumaBot:
- Exfiltrates system information π§
- Establishes persistence π
- Executes remote commands from the attacker π»
π΅οΈ Detection Evasion
To avoid detection, the malware:
- Writes itself to
/lib/redis
, mimicking a Redis system file - Creates a fake systemd service in
/etc/systemd/system
(e.g.,redis.service
ormysqI.service
) - Checks for honeypot environments
- Searches for the string
"Pumatronix"
to either target or avoid specific hardware
πΈ Cryptojacking Activity
PumaBot is suspected to deploy the XMRig miner by executing commands like xmrig
and networkxm
. Although these are issued without full paths, it is believed the actual payloads are downloaded or extracted elsewhere on the system.
π§© Additional Components
Darktraceβs investigation revealed several related tools and scripts:
ddaemon
π: Go-based backdoor that retrievesnetworkxm
and runsinstallx.sh
networkxm
π: Brute-force tool fetching password lists and scanning other IPsinstallx.sh
π: Downloadsjc.sh
from1.lusyn[.]xyz
, makes it executable, runs it, and clears bash historyjc.sh
π§ͺ: Replacespam_unix.so
with a malicious version and downloads a binary named1
pam_unix.so
π³οΈ: Rootkit that logs credentials from successful logins to/usr/bin/con.txt
1
π€: Watches for thecon.txt
file and exfiltrates its contents to the C2
β οΈ Security Recommendations
Given PumaBotβs worm-like behavior, security teams are advised to:
- π Monitor for unusual or failed SSH login attempts
- π§Ύ Regularly audit
systemd
services - π Review
authorized_keys
for unknown entries - π« Enforce strict firewall rules to limit SSH exposure
- π¦ Filter HTTP traffic with suspicious headers like
X-API-KEY: jieruidashabi
π‘ PumaBot is a stealthy, Go-based SSH threat using automation, obfuscation, and legitimate-looking files to persist on infected Linux systems. Its focus on evasion and spread highlights the need for robust detection and response mechanisms.