Go-Based Botnet Attacking IoT Devices

Jun 05, 2025

Using an SSH credential brute-force attack, the Go-based PumaBot is exploiting IoT devices everywhere.

Darktrace has discovered a new Go-based botnet, named PumaBot, that is targeting Internet of Things (IoT) devices and avoiding scanning by using a C2 server to acquire targets and then use brute-force attacks to grab SSH credentials.

PumaBot retrieves a list of targets from a command-and-control server and then establishes persistence, using system service files.

After harvesting a list of IP addresses for IoT devices with open SSH ports, PumaBot identifies a valid SSH credential pair, logs in, self-deploys, and begins the replication process. PumaBot uses a trySSHLogin() function to perform environment fingerprint checks to avoid getting trapped in honeypots or execution environments (such as restricted shells) that are suitable for its needs. If the environment passes the checks, the malware runs the uname -a command to discover the operating system type, kernel version, and architecture. After that, it disguises itself as a legitimate Redis system file, creates a systemd service, and adds its own SSH keys to the user's authorized_keys file.

PumaBot does not automatically propagate like a traditional worm, but it does present worm-like behavior.

According to Darktrace, it's important to monitor for anomalous SSH login activity, audit systemd services, inspect the authorized_keys file, filter or alert on outbound HTTP requests with nonstandard headers (such as X-API-KEY), and apply strict firewall rules to limit SSH exposure.
 
 

 
 
 

Related content

  • Chuck Norris Botnet Affects Linux Routers

    Researchers at the University of Masaryk in Brno, Czech Republic, have detected a botnet that can hit Linux routers and DSL modems.

  • Psyb0t Attacks Linux Routers

    A botnet named psyb0t has been nesting for a few months in consumer devices that run on Linux with MIPS CPUs, notably routers. Infested devices connect through a botnet over a private Internet Relay Chat (IRC) server to await commands.

  • Psyb0t Attacks Linux Routers (Update)

    A botnet named psyb0t has been nesting for a few months in consumer devices that run on Linux with MIPS CPUs, notably routers. Infested devices connect through a botnet over a private Internet Relay Chat (IRC) server to await commands.

  • Cyberthreat Forecasts for 2010: More Complex with New Targets

    Russian security experts Kaspersky ventures a forecast for malware development in 2010 and sees new types of attacks coming our way.

  • Developing Botnets

    Botnets aren’t all bad. We’ll show you how to harness the power of the botnet architecture to solve realworld problems in a business context.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News