New Linux PumaBot Attacking IoT Devices by Brute-Forcing SSH Credentials

Cybersecurity researchers have identified a sophisticated new threat targeting the expanding Internet of Things ecosystem.

PumaBot, a Go-based Linux botnet, has emerged as a significant concern for organizations operating vulnerable IoT devices, particularly surveillance systems.

Unlike conventional malware that conducts broad internet scans, this botnet employs a more targeted and stealthy approach to compromise embedded devices running Linux operating systems.

Google News

The malware’s attack methodology centers on SSH credential brute-forcing, but with a strategic twist that sets it apart from traditional botnets.

Rather than scanning the internet indiscriminately, PumaBot retrieves curated lists of target IP addresses from command-and-control servers, enabling it to focus its efforts on specific vulnerable devices while avoiding detection mechanisms designed to identify mass scanning activities.

PolySwarm analysts identified PumaBot during recent threat research operations, noting its sophisticated evasion capabilities and targeted approach to IoT compromise.

The researchers observed that the malware demonstrates particular interest in surveillance and traffic camera systems, incorporating specific fingerprinting logic to detect devices manufactured by Pumatronix, a surveillance equipment company.

Once PumaBot successfully infiltrates a target system through compromised SSH credentials, it immediately begins establishing persistence mechanisms designed to survive system reboots and security sweeps.

The primary objective appears to be cryptocurrency mining, with researchers observing commands like “xmrig” and “networkxm” being executed on compromised devices to generate illicit profits for the operators.

The botnet’s emergence highlights the growing vulnerability of IoT ecosystems, where default credentials and poor security practices create attractive targets for cybercriminals seeking to monetize compromised computing resources.

Infection Mechanism and Persistence Tactics

PumaBot’s infection process demonstrates remarkable sophistication in its persistence strategy. After gaining initial access through SSH brute-forcing, the malware writes itself to system directories like /lib/redis, deliberately masquerading as legitimate Redis database software.

This deception extends to creating systemd service files with names like redis.service or mysql.service, notably using a capitalized ‘I’ to mimic MySQL services and ensure automatic startup during system initialization.

The malware collects comprehensive system information using commands such as uname -a, gathering details about the operating system, kernel version, and architecture.

This intelligence, combined with victim credentials, is then transmitted to command-and-control servers through custom HTTP headers in JSON format, enabling operators to maintain detailed inventories of compromised devices and their capabilities.

Speed up and enrich threat investigations with Threat Intelligence Lookup! -> 50 trial search requests

Tushar Subhra Dutta
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.