Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»New Pububot Botnet Brute Forces SSH CraDencials for Breach devices
    Security

    New Pububot Botnet Brute Forces SSH CraDencials for Breach devices

    PineapplesUpdateBy PineapplesUpdateMay 28, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    New Pububot Botnet Brute Forces SSH CraDencials for Breach devices
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New Pububot Botnet Brute Forces SSH CraDencials for Breach devices

    A newly discovered Go-based Linux Botnet Malware, named Pububot, has ssh credentials on embedded IOT devices to deploy malicious payloads.

    The target nature of Pumabot is also clear from the fact that it targets specific IP based on lists drawn from a command-end-control (C2) server rather than extensive scanning of the Internet.

    Targeting monitoring cam

    Darktrace documented in pumabot a report Providing observation of the flow of botnett attack, indicators of compromise (IOCs), and detection rules.

    Malware achieves a list of the target IPS from its C2 (ssh.ddos -CC.org) and attempts to make the Brout-Force Login attempts on Port 22 for open SSH Access.

    During this process, it examines for the appearance of a “pummatronics” string, which the darkness believes that the seller may be monitored by the seller and the targeting of the traffic camera system.

    Once the target is established, the malware receives credentials to test against them.

    If successful, it runs ‘Uname -A’ to get environmental information and verify the target device, it is not a honeypot.

    Subsequently, it writes /Lib /Redis to its main binary and installs a systemd service (redis.service) to secure firmness in the device reboot.

    Finally, it injects its own SSH to the ‘authorized_Kies’ file to maintain access, even in the case of a cleanliness that removes primary infection.

    Where the infection remains active, the pumabot can achieve command to try data exfIs, can introduce new payloads, or steal useful data in lateral movement.

    Examples viewed by Darktrace include self-updating scripts, Pam Rootkits that replace legitimate ‘Pam_unix.so’, and daemons (binary file “1”).

    The malicious Pam module harvests local and remote SSH login details and stores them in a text file (con.txt). “Watcher” binary (1) continuously looks for that text file and then exfers it to C2.

    Writing credentials on a text file
    Writing credentials on a text file
    Source: dark

    After exfering, the text file is wiped out of the infected host to remove any mark of malicious activity.

    The size and success of the pumabot is currently unknown, and the Darktrace is not mentioned how wide the target IP list is.

    It stands to launch new botnett malware targeted attacks that can open the way for corporate network infiltration directly for lower-grade cybercrime, such as distributed service of service (DOS) attacks or proxy networks.

    To defend against botnet hazards, upgrade the IOTS to the latest available firmware version, change default credentials, place them behind the firewall, and place them in a separate network separately from the valuable system.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    botnet Breach Brute CraDencials devices forces Pububot SSH
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe iPhone 17 Pro Max is shown in the video just on the hand-and a big design trading is off
    Next Article Arc browser is dead, but Firefox-based Zen is a great option
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    No matter? No problem! Imagine a smart home app to control all your devices

    January 14, 2026
    Startups

    Your smart home is at risk – 6 ways to protect your devices from attack

    December 6, 2025
    Startups

    This Lenovo laptop is one of my favorite work devices of 2025 and it’s 40% off

    December 1, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Google tests AI-operated audio overview in search results for some questions

    June 16, 20250 Views

    Yes, this was the original voice of the Garat in the trailer for the thief VR

    June 16, 20250 Views

    Best LC10 loadout in call of duty: Warzone

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.