Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

    October 13, 2025

    German state replaces Microsoft Exchange and Outlook with open-source email

    October 13, 2025

    Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

    October 13, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk
    • German state replaces Microsoft Exchange and Outlook with open-source email
    • Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns
    • The most important Intel Panther Lake updates are the least talked about – I’ll explain
    • Is AI even worth it for your business? 5 expert tips to help prove ROI
    • Feeling lonely at work? You’re not alone – 5 ways to boost your team’s morale
    • New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login
    • These Bose headphones took my favorite AirPods Max battery feature – and did it even better
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Security»Novel PumaBot slips into IoT surveillance with stealthy SSH break-ins
    Security

    Novel PumaBot slips into IoT surveillance with stealthy SSH break-ins

    TechurzBy TechurzMay 30, 2025No Comments1 Min Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Novel PumaBot slips into IoT surveillance with stealthy SSH break-ins
    Share
    Facebook Twitter LinkedIn Pinterest Email


    By focusing on IoT surveillance devices, such as IP cameras and network video recorders, the botnet is exploiting equipment that is typically outside the scope of rigorous security measures.

    Targeted infiltration via C2 coordination

    PumaBot connects to a designated C2 server to obtain a curated list of IP addresses with open SSH ports. Using these lists, it attempts to brute-force SSH credentials to infiltrate devices, a technique that helps it reduce the likelihood of detection by traditional security measures that look for the noise from an internet-wide scan.

    For the campaign, PumaBot uses a malware identified by the filename jierui that initiates the operation by invoking the getIPs() function to receive the IP list from the C2 server (ssh.ddos-cc[.]org). “It then performs brute-force login attempts on port 22 using credential pairs also obtained from the C2 through the readLinesFromURL(), brute(), and trySSHLogin() functions,” researchers said. Port 22 is the default network port used by the SSH protocol.

    Inside its trySSHLogin() routine, the malware runs a series of environment fingerprinting checks to dodge honeypots and restricted shells. Additionally, it looks for the string “Pumatronix”– which probably inspired PumaBot’s naming–, a surveillance and traffic camera systems manufacturer.

    breakins IoT PumaBot slips SSH stealthy surveillance
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleGet your Father’s Day shopping done with this all-time low Sonos Ace headphones deal
    Next Article This new YouTube Shorts feature lets you circle to search videos more easily
    Techurz
    • Website

    Related Posts

    Security

    Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

    October 13, 2025
    Security

    German state replaces Microsoft Exchange and Outlook with open-source email

    October 13, 2025
    Security

    Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

    October 13, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

    October 13, 2025

    German state replaces Microsoft Exchange and Outlook with open-source email

    October 13, 2025

    Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

    October 13, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.