{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreihehahygvfscprdtowcqlr22ug5mtgge35k7zuvi45kyhhrgfbie4",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3meqlaq4xlnl2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreienf4336w7coips727uvub3dpu2mmszpsjppje3nkqjqc5ulsb3vu"
    },
    "mimeType": "image/jpeg",
    "size": 18853
  },
  "path": "/sshstalker-botnet-uses-legacy-exploits-and-irc-c2-to-hijack-linux-systems/",
  "publishedAt": "2026-02-13T09:35:01.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "SSHStalker Botnet Uses Legacy Exploits and IRC C2 to Hijack Linux Systems",
    "VPN Central"
  ],
  "textContent": "Cybersecurity researchers have uncovered a new Linux botnet operation known as SSHStalker, which targets exposed SSH servers and uses the classic Internet Relay Chat (IRC) protocol for command-and-control (C2). The botnet leverages a large catalog of old Linux kernel vulnerabilities to compromise systems, maintain persistent access, and enroll infected hosts into IRC control channels. According […]\n\nThe post SSHStalker Botnet Uses Legacy Exploits and IRC C2 to Hijack Linux Systems appeared first on VPN Central.",
  "title": "SSHStalker Botnet Uses Legacy Exploits and IRC C2 to Hijack Linux Systems"
}