{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreihehahygvfscprdtowcqlr22ug5mtgge35k7zuvi45kyhhrgfbie4",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3meqlaq4xlnl2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreienf4336w7coips727uvub3dpu2mmszpsjppje3nkqjqc5ulsb3vu"
},
"mimeType": "image/jpeg",
"size": 18853
},
"path": "/sshstalker-botnet-uses-legacy-exploits-and-irc-c2-to-hijack-linux-systems/",
"publishedAt": "2026-02-13T09:35:01.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"SSHStalker Botnet Uses Legacy Exploits and IRC C2 to Hijack Linux Systems",
"VPN Central"
],
"textContent": "Cybersecurity researchers have uncovered a new Linux botnet operation known as SSHStalker, which targets exposed SSH servers and uses the classic Internet Relay Chat (IRC) protocol for command-and-control (C2). The botnet leverages a large catalog of old Linux kernel vulnerabilities to compromise systems, maintain persistent access, and enroll infected hosts into IRC control channels. According […]\n\nThe post SSHStalker Botnet Uses Legacy Exploits and IRC C2 to Hijack Linux Systems appeared first on VPN Central.",
"title": "SSHStalker Botnet Uses Legacy Exploits and IRC C2 to Hijack Linux Systems"
}