A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations.
It's just as powerful and simple, but (if you want) it can be self-hosted for maximum privacy.
Researchers uncover SSHStalker, an IRC botnet exploiting legacy Linux flaws and SSH servers to build persistent covert access.
My 5 favorite Linux distros that are ready to use out of the box (no setup required) ...
Control services, read logs, profile boot time, and inspect crashes with these four built-in systemd tools.