On July 22, 2025, cybersecurity researchers from AhnLab Security Intelligence Center (ASEC) reported active attacks deploying the SVF botnet, a Python-based DDoS malware targeting poorly managed Linux SSH servers. Threat actors exploit weak SSH credentials through brute-force attacks, installing payloads that enable DDoS capabilities, credential theft, and proxy networks for further compromises. Shared by users like @R4yt3d on X, this campaign highlights the persistent risks to exposed Linux systems. With no specific attribution to groups, the botnet's use of Discord for command-and-control (C2) adds a layer of stealth. Below, we explore the botnet's mechanics, infection methods, implications, and essential hardening measures.
SVF is a sophisticated DDoS botnet written in Python, designed for Linux environments. It supports multiple attack types, including HTTP floods and UDP floods, leveraging infected devices as proxies to amplify assaults. The malware uses Discord webhooks for C2 communication, allowing operators to issue commands discreetly without traditional servers.Key features include:
Observed since mid-July 2025, SVF has been tracked through honeypots, with infections leading to botnet expansion for DDoS-for-hire services.
The primary vector is brute-force attacks on SSH servers with weak or default credentials. Attackers scan for open SSH ports (typically 22), attempting common username-password combinations like "root" with simple passwords.Post-compromise steps include:
Attacks originate from IPs like 185.234.218.40, with payloads hosted on domains such as 185.234.218.40. No advanced exploits like zero-days are used; reliance is on poor configurations.
SVF's tactics emphasize stealth and scalability. Once installed, it communicates via Discord for commands like "httpflood" or "udpflood," using infected proxies to mask origins. It also disables security tools, clears histories, and sets up backdoors.While not linked to specific nations, patterns suggest opportunistic actors, possibly from Russia based on some reports. The botnet is evolving, with updates incorporating better obfuscation and multi-architecture support.
SVF infections enable powerful DDoS attacks, disrupting services and extorting victims. Beyond DDoS, compromised servers can serve as pivots for deeper network intrusions, data theft, or cryptocurrency mining. This urges organizations to prioritize SSH security, as weak policies expose critical infrastructure to botnet recruitment.In cloud-heavy environments, such bots can inflate costs through resource abuse. The use of Discord for C2 complicates detection, as legitimate traffic blends with malicious.
To mitigate SVF and similar threats, implement these measures:
Organizations should conduct vulnerability assessments and educate admins on best practices. For IOCs, refer to ASEC's report and monitor for indicators like specific IPs or file hashes. As botnets like SVF evolve, proactive defenses are crucial to prevent recruitment into malicious networks.