Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsGlobal SystemBC Botnet Found Active Across 10,000 Infected Systems
Global SystemBC Botnet Found Active Across 10,000 Infected Systems
Cybersecurity

Global SystemBC Botnet Found Active Across 10,000 Infected Systems

•February 4, 2026
0
Infosecurity Magazine
Infosecurity Magazine•Feb 4, 2026

Companies Mentioned

Silent Push

Silent Push

Bthoster

Bthoster

Microsoft

Microsoft

MSFT

Why It Matters

SystemBC’s early‑stage proxy capabilities give attackers stealthy footholds, increasing the risk of ransomware and supply‑chain compromise for critical infrastructure.

Key Takeaways

  • •Over 10,000 IPs infected globally, spanning five continents.
  • •SystemBC acts as SOCKS5 proxy, masking attacker traffic.
  • •New Perl variant evades all major antivirus detections.
  • •Infections persist average 38 days, up to 100+ days.
  • •Bullet‑proof hosting enables long‑term botnet resilience.

Pulse Analysis

The SystemBC botnet, first seen in 2019, has resurfaced as a formidable proxy network, now linked to over 10,000 compromised IPs across five continents. By turning victims into SOCKS5 relays, threat actors can hide malicious traffic and maintain footholds inside target environments, often before ransomware strikes. Silent Push’s new fingerprinting method reveals that the botnet’s activity consistently precedes high‑impact intrusions, underscoring its role as an early‑stage weapon in sophisticated cyber‑crime campaigns. Its ability to route traffic through compromised cloud assets also threatens supply‑chain integrity, as downstream services may unknowingly trust malicious endpoints.

Detection remains difficult because most infections reside on data‑centre servers rather than home PCs, allowing them to linger for weeks. A previously undocumented Perl variant targeting Linux escaped all 62 major antivirus engines at the time of discovery, highlighting the botnet’s adaptability. The infrastructure relies heavily on bullet‑proof hosting providers such as BTHoster and AS213790, which tolerate abuse and complicate takedown efforts. Consequently, compromised systems—including government websites in Burkina Faso and Vietnam—can be leveraged for prolonged malicious proxying. On average, infected hosts remain under control for 38 days, with some persisting beyond 100 days, amplifying exposure risk.

Enterprises and public‑sector organizations should treat SystemBC indicators as a warning sign of imminent ransomware activity. Integrating the fingerprint into SIEMs, monitoring for unusual SOCKS5 traffic, and enforcing strict outbound connection controls can disrupt the botnet’s command‑and‑control chain. Moreover, regular patching of Linux services and scrutinizing third‑party hosting contracts reduce the attack surface that the Perl variant exploits. Proactive threat‑intel sharing and coordinated takedowns with hosting providers are essential to shrink the botnet’s lifespan and protect critical infrastructure. Regulators may view prolonged compromise of government domains as a breach of critical‑infrastructure standards, prompting stricter compliance audits.

Global SystemBC Botnet Found Active Across 10,000 Infected Systems

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...