- Cyber Syrup
- Posts
- Outlaw Botnet: Targets Weak SSH Servers for Cryptocurrency Mining
Outlaw Botnet: Targets Weak SSH Servers for Cryptocurrency Mining
Cybersecurity researchers have released new findings on Outlaw, also known as Dota, a self-propagating botnet that targets Linux systems with exposed SSH servers

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.
You’ve heard the hype. It’s time for results.
After two years of siloed experiments, proofs of concept that fail to scale, and disappointing ROI, most enterprises are stuck. AI isn't transforming their organizations — it’s adding complexity, friction, and frustration.
But Writer customers are seeing positive impact across their companies. Our end-to-end approach is delivering adoption and ROI at scale. Now, we’re applying that same platform and technology to build agentic AI that actually works for every enterprise.
This isn’t just another hype train that overpromises and underdelivers. It’s the AI you’ve been waiting for — and it’s going to change the way enterprises operate. Be among the first to see end-to-end agentic AI in action. Join us for a live product release on April 10 at 2pm ET (11am PT).
Can't make it live? No worries — register anyway and we'll send you the recording!
Outlaw Botnet: Targets Weak SSH Servers for Cryptocurrency Mining

Cybersecurity researchers have released new findings on Outlaw, also known as Dota, a self-propagating botnet that targets Linux systems with exposed SSH servers. Outlaw leverages brute-force attacks, cryptocurrency mining, and worm-like propagation, allowing it to persist and scale its reach across compromised environments.
The research, published by Elastic Security Labs, offers a deeper look into the botnet’s tactics, techniques, and procedures (TTPs), painting a picture of a long-running and evolving threat in the cryptojacking ecosystem.
Who Is Behind Outlaw?
Outlaw is not only the name of the malware but also the threat actor group responsible for its development and deployment. Believed to be of Romanian origin, Outlaw has been active since at least 2018 and is part of a broader ecosystem of cybercriminals focused on cryptocurrency mining through illicit access.
Other major groups in this space include:
8220 Gang
Keksec (aka Kek Security)
Kinsing
TeamTNT
These groups have repeatedly demonstrated the monetary incentives and low entry barriers associated with cryptojacking operations, particularly in Linux-based environments.
Infection Chain: How Outlaw Works
The Outlaw botnet targets poorly secured SSH servers, focusing on those with weak or default credentials. Once access is gained, the attackers add their SSH public key to the authorized_keys
file, ensuring persistent, passwordless access even if credentials are rotated.
Multi-Stage Infection Flow
Initial Access via SSH Brute Force
Exploits weak SSH credentials to gain unauthorized access
Deployment of Dropper Script
A shell script called
tddwrt7s.sh
is downloaded and executedThis script retrieves and unpacks an archive file (
dota3.tar.gz
)
Installation and Cleanup
The malware launches the cryptocurrency miner
Simultaneously, it removes traces of previous infections and eliminates other active miners, including its own outdated versions
Worm-Like Propagation and Brute Forcing
A standout feature of the malware is its self-propagation mechanism, driven by an initial access module known as BLITZ. This component:
Scans the internet for systems running SSH services
Connects to a C2 (Command and Control) server over SSH
Fetches a list of new targets to perpetuate the infection cycle
This botnet-style approach enables the malware to scale rapidly, particularly in environments with many vulnerable servers.
Exploiting Known Vulnerabilities and Telnet
Beyond brute-forcing SSH, Outlaw also targets older Linux and Unix-based systems vulnerable to:
CVE-2016-8655
CVE-2016-5195 (Dirty COW)
The malware may also use Telnet brute-forcing to expand its reach further, especially in embedded systems or IoT environments.
Command and Control with SHELLBOT
Upon establishing access, Outlaw deploys a component called SHELLBOT—a tool that connects to a C2 server via IRC (Internet Relay Chat). SHELLBOT enables a wide range of malicious activities, including:
Execution of arbitrary shell commands
Downloading and running additional payloads
Launching DDoS (Distributed Denial-of-Service) attacks
Credential theft
Data exfiltration
IRC remains a popular choice among threat actors for its simplicity and low visibility, especially in Linux systems.
Mining Operations and Persistence
The malware is optimized for cryptocurrency mining, specifically targeting systems for XMRig-based Monero mining.
Mining Optimization Techniques:
CPU Detection: Determines system capabilities for optimal mining performance
Hugepages Activation: Enables hugepages across all CPU cores to boost memory access efficiency
Persistence via Cron: Uses cron jobs to relaunch malware at reboot or predefined intervals
Custom Communication Binary: A tool named
kswap01
maintains communication with the threat actor's infrastructure
Defense Evasion and Public Tools
Despite relying on what may appear to be basic attack methods, Outlaw integrates several techniques for defense evasion:
Modified XMRig miners to evade miner-detection signatures
SSH key manipulation for stealthy persistence
Publicly available scripts to clean logs and prevent detection
“Outlaw remains active despite using basic techniques like SSH brute-forcing, SSH key manipulation, and cron-based persistence,” said Elastic Security Labs. “It shows how even simple tools, when orchestrated correctly, can form a resilient and dangerous malware campaign.”
Recommendations for Mitigation
Organizations and administrators should take proactive steps to defend against threats like Outlaw:
Disable SSH access from the internet unless absolutely necessary
Use strong, unique SSH credentials and implement multi-factor authentication
Regularly rotate SSH keys and audit the
authorized_keys
filePatch Linux systems to address known vulnerabilities like Dirty COW
Monitor for unusual processes, high CPU usage, and IRC traffic
Final Thoughts
The Outlaw botnet exemplifies how long-running, low-complexity threats can still pose serious risks when targeting misconfigured or unprotected systems. By combining brute-force access, mining, and self-propagation, the malware ensures that even basic security oversights can lead to persistent compromises and resource theft.
Maintaining SSH hygiene, monitoring system behavior, and staying up to date with Linux security patches are key defenses in today’s evolving threat landscape.