Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us
  • Home
  • News
  • From The Hacker News – Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
From The Hacker News – Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Posted inNews

From The Hacker News – Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

Posted by shaikh Saqib April 2, 2025

Cybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka Dota) that’s known for targeting SSH servers with weak credentials.
“Outlaw is a Linux malware that relies on SSH brute-force attacks, cryptocurrency mining, and worm-like propagation to infect and maintain control over systems,” Elastic Security Labs said in a new analysis Read More

Tags:
auto-propagating malwarebotnet infection processcryptocurrency mining malwarecryptojackingcryptojacking botnetsCVE-2016-5195CVE-2016-8655cyber awarenesscyber defensecyber protectioncyber threat actorscybersecuritycybersecurity newsdata breachesdigital privacyDirty COW exploitDota malwareElastic Security Labshackinghacking newsinfosecinfosec newsIRC C2 communicationLinux cyber threatsLinux malwareLinux security threatsmalware persistence techniquesnetwork securitynoteonline securityOutlaw botnetOutlaw hacking groupsecurity perspectivesecurity updatesSHELLBOT malwareSSH botnet campaigns.SSH brute-force attackSSH command-and-controlSSH key manipulationSSH securitySSH server vulnerabilitiesthreatthreat intelligencethreat notethreatnoteweak credentials attackworm-like propagationXMRig miner malware
Last updated on April 3, 2025

Latest Posts

  • From Security Week – Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingMay 7, 2026
  • From Security Week – Boost Security Raises $4 Million for SDLC Defense PlatformMay 7, 2026
  • From Security Week – Claude Code OAuth Tokens Can Be Stolen Through Stealthy MCP HijackingMay 7, 2026
  • From Security Week – Chrome 148 Rolls Out With 127 Security FixesMay 7, 2026
  • From The Hacker News – One Click, Total Shutdown: The “Patient Zero” Webinar on Killing Stealth BreachesMay 7, 2026
Total Visitors
1494336

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top