In the rapidly evolving cybersecurity threat landscape, a new and stealthy botnet named PumaBot has surfaced. This sophisticated malware is targeting Linux-based Internet of Things (IoT) devices, exploiting system vulnerabilities to hijack resources for illicit cryptocurrency mining. The emergence of PumaBot signals a growing trend where cybercriminals weaponize poorly secured IoT devices in more coordinated, evasive ways [1].
🔍 What is PumaBot?
PumaBot is a Go-based malware campaign that has recently caught the attention of cybersecurity researchers. Rather than launching broad internet scans, PumaBot pulls a list of targeted IPs from a command-and-control (C2) server and proceeds to brute-force SSH credentials to gain unauthorized access [1][2].
Upon successful breach, the malware installs itself, establishes persistence, and starts mining cryptocurrencies—without the device owner’s consent [2].
⚙️ How PumaBot Operates
1. Target Acquisition
Unlike traditional botnets, PumaBot doesn’t rely on indiscriminate scanning. Instead, it queries a C2 server (ssh.ddos-cc[.]org) to retrieve a pre-defined list of potential targets [1].
2. Credential Brute-Force
It then attempts to brute-force SSH login credentials, checks the system environment for traps (like honeypots), and specifically avoids systems associated with the string “Pumatronix,” possibly indicating a targeted exclusion or inclusion [2].
3. Persistence Mechanism
After access is gained:
- PumaBot copies itself to
/lib/redis, masquerading as a Redis service binary. - It sets up a systemd service under names like
redis.serviceormysqI.service(note the typo to evade detection) to maintain persistence [1].
4. Cryptocurrency Mining
Once installed, PumaBot executes mining operations using tools like xmrig and networkxm, draining resources from compromised devices to earn cryptocurrency for the attackers [2].
5. Deployment of Additional Malware
PumaBot also drops and executes several auxiliary binaries to enhance its functionality and deepen its foothold:
ddaemon: Downloads and runsnetworkxmandinstallx.sh.networkxm: SSH brute-forcing tool using a password list from the C2 server.installx.sh: Downloads and executes thejc.shscript.jc.sh: Installs a maliciouspam_unix.sorootkit to steal login credentials.pam_unix.so: Intercepts SSH login credentials and stores them in/usr/bin/con.txt.1: Monitors for thecon.txtfile and exfiltrates its data to the attacker [2].
🛡️ How to Protect Against PumaBot
Protecting against threats like PumaBot requires a multi-layered security strategy:
- Use Strong, Unique Passwords: Never leave default credentials in place.
- Disable SSH if Unused: Reduce your attack surface.
- Update Firmware and OS: Patch vulnerabilities regularly.
- Segment Networks: Keep IoT devices isolated from critical systems.
- Implement Firewalls & IDS/IPS: Detect and respond to anomalous traffic.
- Audit User Accounts & Services: Watch for suspicious users and services.
- Monitor for Unusual Behavior: Unexplained CPU usage or network spikes may be signs of compromise.
✅ Conclusion
The emergence of PumaBot represents a clear escalation in the tactics used by cybercriminals to exploit IoT infrastructure. By using stealthy distribution methods, credential brute-forcing, rootkit installation, and system disguise techniques, PumaBot serves as a stark reminder of the vulnerabilities that still plague Linux-based IoT devices.
As we continue to connect billions of devices to the internet, security must be treated as a foundational pillar—not an afterthought. Regular patching, credential hygiene, and system hardening are no longer optional. In the arms race between defenders and attackers, awareness is our first line of defense.
📚 References
- New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto – The Hacker News
- PumaBot: Novel Botnet Targeting IoT Surveillance Devices – Darktrace







