By specializing in IoT surveillance units, equivalent to IP cameras and community video recorders, the botnet is exploiting tools that’s sometimes exterior the scope of rigorous security measures.
Focused infiltration through C2 coordination
PumaBot connects to a delegated C2 server to acquire a curated checklist of IP addresses with open SSH ports. Utilizing these lists, it makes an attempt to brute-force SSH credentials to infiltrate units, a method that helps it cut back the probability of detection by conventional security measures that search for the noise from an internet-wide scan.
For the marketing campaign, PumaBot makes use of a malware recognized by the filename jierui that initiates the operation by invoking the getIPs() perform to obtain the IP checklist from the C2 server (ssh.ddos-cc[.]org). “It then performs brute-force login makes an attempt on port 22 utilizing credential pairs additionally obtained from the C2 by the readLinesFromURL(), brute(), and trySSHLogin() capabilities,” researchers stated. Port 22 is the default community port utilized by the SSH protocol.
Inside its trySSHLogin() routine, the malware runs a sequence of setting fingerprinting checks to dodge honeypots and restricted shells. Moreover, it appears for the string “Pumatronix”– which in all probability impressed PumaBot’s naming–, a surveillance and site visitors digicam programs producer.



