LIVE NEWSROOM · --:-- · May 15, 2026
A LIBRARY FOR SECURITY RESEARCHERS

Linux SSH Server gets Infected with Tsunami botnet malware

Post on X LinkedIn
Linux SSH Server gets Infected with Tsunami botnet malware

An unknown attacker is brute-forcing Linux SSH servers to install various malware, including the Tsunami DDoS (distributed denial of service) bot, ShellBot, log cleaners, privilege escalation tools, and an XMRig (Monero) coin miner.

SSH is an encrypted network communication protocol used for logging into remote machines, supporting tunnelling, TCP port forwarding, file transfers, etc.

Network administrators mostly use SSH to manage Linux devices remotely, it can also perform tasks such as running commands, changing the configurations, updating software, and troubleshooting problems.

// 01 Tsunami attack on SSH

AhnLab Security Emergency Response Center (ASEC) recently found an attack, that hacked Linux servers to launch DDoS attacks and mine Monero cryptocurrency.

Attackers scan the network for publicly exposed Linux SSH servers and then brute-forced username-password pairs to log in to the server.

The pairs used are like: –

ssh_credential_pair_used

When attackers get access to the endpoint with admin rights, they run the following command through the terminal to install and execute the malware through the bash script.

ssh

this command is executed on the recently breached server

Intruders are also involved in this attack and generate new pairs of public and private SSH keys to get access even after the user password changes. Malware that is downloaded on compromised machines includes DDoS botnets, log cleaners, cryptocurrency miners, and privilege escalation tools.

Other than the malware that is installed, the “key” file is a downloader-type Bash script file that installs additional malware that takes control of infected systems, which includes installing a backdoor SSH account.

And the key file is: –

ssh_key_file

The other botnet malware is Tsunami which uses IRC protocol for communication and is used in this attack, the particular version seen by ASEC is “Ziggy,” a Kaiten variant. Tsunami persists between reboots by writing itself on “/etc/rc.local” and uses typical system process names to hide themselves.

Source code of Tsunami botnet: –

source_code

The commands supported by Tsunami malware are: –

ssh_tsunami_commands

The other malware used in this attack are MIG Logcleaner v2.0 and Shadow Log Cleaner. These tools are used to wipe the evidence related to the malware on the victim’s machine and help in getting a persistent connection. Both tools support specific command arguments that enable the operators to delete logs, modify existing logs, or add new logs to the system.

Adding a fake login event on a server using this command: –

fake_login_event

The ELF (Executable and Linkable Format) privilege escalation malware file is used to escalate privileges in these attacks.

Now, the attacker activates the XMRig coin miner to hack the server’s computational resources to mine Monero on a specified pool.

To prevent these attacks, all Linux users should use strong account passwords or, for better security, require SSH keys to log in to the SSH server.

    TE
    Team Ciphers Security

    Independent cybersecurity desk publishing daily threat intel and research since 2021. Practitioners writing for analysts, defenders, and learners. About us →

    Previous Difference between Standard and Extended ACLs (Access Control List) Next 8085 vs 8086 Microprocessors

    Latest News

    YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support YARA-X 1.16.0 ships with performance improvements across 10 PRs, constant folding for bitwise ops, configurable mat… Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes Instructure was quietly removed from ShinyHunters' extortion site after the May 12, 2026 deadline — no data dump, n… Costa Rica Joins Have I Been Pwned as the 42nd Government Costa Rica's CSIRT gains free access to Have I Been Pwned's government domain monitoring service, becoming the 42nd… LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures CISA and FBI advisory AA25-141B details LummaC2 MaaS infostealer TTPs targeting critical infrastructure. DOJ seized… MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware Russian-speaking attackers combine Google Ads and Claude.ai shared chats in a ClickFix campaign deploying MacSync S… JDownloader Site Hacked, Installers Swapped with Python RAT Malware JDownloader's website was hacked May 6–7, 2026, replacing Windows and Linux installers with a Python-based RAT. Use… Operation HookedWing: 4-Year Phishing Campaign Hits 500+ Organizations Across Aviation, Energy, and Logistics Operation HookedWing has stolen credentials from 500+ organizations in aviation, energy, logistics, and critical in… Twelve Critical vm2 Node.js Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen CVEs in the vm2 Node.js sandbox library — including CVSS 10.0 flaws — allow sandbox escape and RCE. Update …
    Scroll to Top