Q1 2026 Malware Statistics Report for Linux SSH Servers

Analysis of attacks against Linux SSH servers during Q1 2026 reveals P2PInfect worm as the dominant threat, representing 70.3% of all attack sources. DDoS botnets including Mirai, XMRig, Prometei, and CoinMiner were identified as primary threats. A notable campaign involved installing V2Ray proxy tools on compromised systems, attributed to a suspected Chinese threat actor. Attackers employed SSH brute-force techniques to gain access, executed reconnaissance commands to assess system information, and deployed V2Ray for proxy node operations. The campaign targeted poorly secured SSH servers with weak credentials, emphasizing the need for strong password policies, access controls, and network monitoring to detect unusual outbound connections and proxy-related activities.

Pulse ID: 69de00c30406a5cbb6ba9eef
Pulse Link: https://otx.alienvault.com/pulse/69de00c30406a5cbb6ba9eef
Pulse Author: AlienVault
Created: 2026-04-14 08:54:27

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Chinese #CoinMiner #CyberSecurity #DDoS #DoS #ICS #InfoSec #Linux #Malware #Mirai #OTX #OpenThreatExchange #Password #Proxy #RAT #RCE #SSH #Word #Worm #bot #botnet #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
500 Tbps of capacity: 16 years of scaling our global network

Cloudflare’s global network has officially crossed 500 Tbps of external capacity, enough to route more than 20% of the web and absorb the largest DDoS attacks ever recorded.

The Cloudflare Blog
You know you're tired when your astigmatism turns #DS9 into #DDoS

ASO RAT: Arabic-Language Android Surveillance Platform Targeting Syria

ASO RAT is a custom Android Remote Access Trojan featuring comprehensive device compromise capabilities including SMS interception, camera access, GPS tracking, call logging, file exfiltration, and DDoS functionality. Operating from Frankfurt-based infrastructure with connections to Syria, the platform disguises itself as PDF readers and Syrian government applications. Investigation revealed two active C2 servers, four DDNS domains, eight malicious APK samples with the newest achieving 0/66 antivirus detections, and complete reverse-engineered panel architecture exposing 21 API endpoints. The multi-user panel with role-based access control suggests RAT-as-a-Service operations. Infrastructure includes historical VPS providers and Starlink satellite connections geolocated to Syria. The developer's Arabic-language interface and Syria-themed lures indicate targeting of opposition figures, journalists, and military personnel within the Syrian conflict theater.

Pulse ID: 69dd062fb9ecc388e52457d3
Pulse Link: https://otx.alienvault.com/pulse/69dd062fb9ecc388e52457d3
Pulse Author: AlienVault
Created: 2026-04-13 15:05:19

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#APK #Android #Arabic #CyberSecurity #DDoS #DNS #DoS #ELF #Endpoint #Government #InfoSec #Military #OTX #OpenThreatExchange #PDF #RAT #RCE #RemoteAccessTrojan #SMS #Syria #Trojan #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Alleged German cybercrime figure Noah Christopher has been arrested in Thailand after years running global DDoS-for-hire services, including Fluxstress and Neldowner, worldwide.

Read: https://hackread.com/german-ddos-for-hire-kingpin-fluxstress-thailand/

#CyberCrime #CyberSecurity #DDoS #Fluxstress #Neldowner

Alleged German DDoS-for-Hire Kingpin Behind Fluxstress Caught in Thailand

Alleged German cybercrime figure behind Fluxstress and Neldowner arrested in Thailand after years running global DDoS-for-hire services across countries.

Hackread - Cybersecurity News, Data Breaches, AI and More

New report from our ERT: #Maskify.

The operator built what a Series A deck would call "decentralized edge infrastructure": ENS for service discovery, IPFS for binary distribution, a custom P2P mesh network, QUIC transport.

In practice it is a DDoS botnet running on Android TV boxes that did not opt in.

https://github.com/deepfield/public-research/blob/main/maskify/report.md

#threatintel #ddos

public-research/maskify/report.md at main · deepfield/public-research

DDoS botnet research and indicators of compromise from Nokia Deepfield ERT - deepfield/public-research

GitHub
Solo como follow up sobre el tema, a modo de reflexion, para que vean la cantidad de energia que se desperdicia lidiando con los ataques y eso. En la gráfica se ve como aumenta el consumo de los servidores, causado principalmente por el aumento de la carga en Centaurus, el server principal donde corre PeerTube. Paso de una media de 360-370W a unos 450-480W sobre el final del ataque. Cuanta energia se gasta al pedo. #energia #servidores #undernet #spam #malware #ataque #ddos
Nuestra instancia de PeerTube esta siendo bombardeada por bots haciendo scraping y haciendo requests de transcodificado de video. Afortunadamente estoy terminando de pulir un script que les hace sonar el orto cuando detecta varias cosas que los delatan... Por suerte el server se la banca bastante... ampliaremos... #peertube #bots #scraping #scrapingbots #ddos

Bug-Reports mit #KI-Unterstützung werden wohl langsam immer besser. Für Open-Source-Projekte ist das trotzdem nicht nur eine gute Nachricht.

Jetzt kommen diese Meldungen teilweise so schnell und zahlreich, dass sie quasi eine Art #DDoS für die Maintainer darstellen und manche Projekte auch keine #Bug Bounties mehr bezahlen können.

https://www.golem.de/news/wichtiges-bug-bounty-programm-pausiert-ki-reports-ueberlasten-open-source-projekte-2604-207325.html

Wichtiges Bug-Bounty-Programm pausiert: KI-Reports überlasten Open-Source-Projekte - Golem.de

Internet Bug Bounty zahlt vorerst keine Prämien mehr. Das betrifft unter anderem Node.js. Der Grund: Mit KI wird viel gemeldet, aber wenig gefixt.

Golem.de
🎨 Hackear es un arte y defender es una ciencia. Domina ambos con el Curso de OWASP Top 10 🔬 Sábados 18 y 25 de abril 2026. De 9 am a 12 pm. (UTC -05:00) 📲 WhatsApp: https://wa.me/51949304030 🤖 https://www.reydes.com/archivos/cursos/Curso_OWASP_Top_10.pdf #zeroday #ddos #databreach #cyberattack #cyberaware #cybersecurityawareness #owasp