A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations.
It's just as powerful and simple, but (if you want) it can be self-hosted for maximum privacy.
The SSHStalker Linux botnet has ensnared 7,000 systems, deploying various scanners and malware, an IRC bot, and multiple kernel exploits.
Researchers uncover SSHStalker, an IRC botnet exploiting legacy Linux flaws and SSH servers to build persistent covert access.
Who needs Netflix when you have Plex, the media server software that runs locally and lets you stream your own local video ...
SSH provides remote, text-based access to Unix systems. It is a secure replacement for Telnet, with several additional features. Pre-requisites for remote access Duo: You will need to have Duo set up.