PumaBot: The Stealthy Botnet Hijacking Linux IoT Devices for Crypto Mining

The PumaBot botnet targets Linux-based IoT devices, exploiting vulnerabilities for unauthorized cryptocurrency mining. Unlike traditional botnets, it retrieves a list of targets from a command-and-control server, brute-forces SSH credentials, and maintains persistence by masquerading as legitimate services. Protecting against PumaBot requires strong passwords, regular updates, and network segmentation.

In the rapidly evolving cybersecurity threat landscape, a new and stealthy botnet named PumaBot has surfaced. This sophisticated malware is targeting Linux-based Internet of Things (IoT) devices, exploiting system vulnerabilities to hijack resources for illicit cryptocurrency mining. The emergence of PumaBot signals a growing trend where cybercriminals weaponize poorly secured IoT devices in more coordinated, evasive ways [1].

🔍 What is PumaBot?

PumaBot is a Go-based malware campaign that has recently caught the attention of cybersecurity researchers. Rather than launching broad internet scans, PumaBot pulls a list of targeted IPs from a command-and-control (C2) server and proceeds to brute-force SSH credentials to gain unauthorized access [1][2].

Upon successful breach, the malware installs itself, establishes persistence, and starts mining cryptocurrencies—without the device owner’s consent [2].

⚙️ How PumaBot Operates

1. Target Acquisition

Unlike traditional botnets, PumaBot doesn’t rely on indiscriminate scanning. Instead, it queries a C2 server (ssh.ddos-cc[.]org) to retrieve a pre-defined list of potential targets [1].

2. Credential Brute-Force

It then attempts to brute-force SSH login credentials, checks the system environment for traps (like honeypots), and specifically avoids systems associated with the string “Pumatronix,” possibly indicating a targeted exclusion or inclusion [2].

3. Persistence Mechanism

After access is gained:

  • PumaBot copies itself to /lib/redis, masquerading as a Redis service binary.
  • It sets up a systemd service under names like redis.service or mysqI.service (note the typo to evade detection) to maintain persistence [1].

4. Cryptocurrency Mining

Once installed, PumaBot executes mining operations using tools like xmrig and networkxm, draining resources from compromised devices to earn cryptocurrency for the attackers [2].

5. Deployment of Additional Malware

PumaBot also drops and executes several auxiliary binaries to enhance its functionality and deepen its foothold:

  • ddaemon: Downloads and runs networkxm and installx.sh.
  • networkxm: SSH brute-forcing tool using a password list from the C2 server.
  • installx.sh: Downloads and executes the jc.sh script.
  • jc.sh: Installs a malicious pam_unix.so rootkit to steal login credentials.
  • pam_unix.so: Intercepts SSH login credentials and stores them in /usr/bin/con.txt.
  • 1: Monitors for the con.txt file and exfiltrates its data to the attacker [2].

🛡️ How to Protect Against PumaBot

Protecting against threats like PumaBot requires a multi-layered security strategy:

  1. Use Strong, Unique Passwords: Never leave default credentials in place.
  2. Disable SSH if Unused: Reduce your attack surface.
  3. Update Firmware and OS: Patch vulnerabilities regularly.
  4. Segment Networks: Keep IoT devices isolated from critical systems.
  5. Implement Firewalls & IDS/IPS: Detect and respond to anomalous traffic.
  6. Audit User Accounts & Services: Watch for suspicious users and services.
  7. Monitor for Unusual Behavior: Unexplained CPU usage or network spikes may be signs of compromise.

✅ Conclusion

The emergence of PumaBot represents a clear escalation in the tactics used by cybercriminals to exploit IoT infrastructure. By using stealthy distribution methods, credential brute-forcing, rootkit installation, and system disguise techniques, PumaBot serves as a stark reminder of the vulnerabilities that still plague Linux-based IoT devices.

As we continue to connect billions of devices to the internet, security must be treated as a foundational pillar—not an afterthought. Regular patching, credential hygiene, and system hardening are no longer optional. In the arms race between defenders and attackers, awareness is our first line of defense.

📚 References

  1. New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto – The Hacker News
  2. PumaBot: Novel Botnet Targeting IoT Surveillance Devices – Darktrace

Discover more from Dailyedutalk

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from Dailyedutalk

Subscribe now to keep reading and get access to the full archive.

Continue reading