Linux SSH Servers Under Fire: Hackers Abuse Legitimate Proxy Tools in New Wave of Attacks

Listen to this Post

Featured Image

Stealth Cyberattacks Target Misconfigured Systems

In the ever-evolving cyber threat landscape, a new wave of attacks is exploiting Linux systems exposed via SSH, with hackers now relying on brute-force techniques and weak password protections to hijack machines. Monitored by the AhnLab Security Intelligence Center (ASEC), these assaults show a dangerous trend: attackers are using legitimate, open-source proxy tools such as TinyProxy and Sing-box to turn compromised machines into proxy nodes for cybercrime infrastructure. Instead of deploying traditional malware, attackers are now using clean, recognizable tools to remain under the radar — a method that makes detection significantly harder.

Hackers Weaponize Weak Passwords and Legal Tools

The attacks begin with brute-force scans on SSH-enabled Linux systems, targeting machines that still rely on simple or default credentials. Once inside, cybercriminals deploy a set of automated scripts, usually delivered via wget or curl, to install legitimate proxy tools. TinyProxy and Sing-box, both respected and open-source, are misused to create anonymized pathways that cybercriminals can leverage for launching further attacks or selling access to underground markets.

In one case, a malicious Bash script cleverly checked for the system’s package manager (apt, yum, or dnf) and used that to automate the installation of TinyProxy. The script then modified the configuration files to allow unrestricted access via port 8888, essentially opening the system to the world. Importantly, these attackers do not move laterally or plant other malware — they operate with surgical precision to minimize detection.

Meanwhile, Sing-box, an advanced proxy platform capable of supporting multiple secure protocols like vless-reality and TUICv5, has also been hijacked. Attackers downloaded and launched it directly from GitHub using bash automation, setting it up to support high-speed, encrypted connections for criminal use. While Sing-box is often used to bypass regional internet restrictions for tools like ChatGPT or Netflix, in this context it becomes a monetization tool within the hacker economy.

The growing trend is clear: cybercriminals prefer using tools that already exist in the system administration world. This reduces their operational burden and allows them to camouflage malicious activities within legitimate-looking processes. Because TinyProxy and Sing-box are widely used and documented, their presence doesn’t immediately trigger alarms on many systems, especially when installed without payloads.

For system administrators, the wake-up call is loud and clear. Strong, unique passwords, timely security patches, network segmentation, and robust firewall rules are no longer optional. They are the baseline defense against increasingly sophisticated threat actors who weaponize legality for illegality. In a world where automated, low-noise cyberattacks are on the rise, visibility and proactive monitoring are now more crucial than ever.

What Undercode Say:

The Evolving Nature of Cyber Exploits

This campaign marks a turning point in the tactics used by threat actors. Rather than focusing on custom malware or ransomware payloads, hackers are now exploiting what’s already available in the Linux ecosystem. Tools like TinyProxy and Sing-box are not just easy to deploy — they’re also less likely to raise red flags during audits or scans. This is especially concerning for DevOps environments and small-scale Linux servers that may not have enterprise-level intrusion detection systems in place.

Automation and Simplicity

The use of Bash scripts, coupled with utilities like wget and curl, points to a fully automated infection chain. Once a server with a weak SSH password is identified, attackers can deploy their payload within seconds. This automation doesn’t just scale the attack — it also ensures consistency, reduces errors, and maximizes the number of systems that can be turned into anonymizing nodes.

Abuse of Open Source for Profit

What makes this campaign especially sinister is its abuse of the open-source philosophy. Both TinyProxy and Sing-box were developed for valid reasons — privacy, accessibility, and performance. But when turned into tools for cybercrime, they highlight how open-source can be a double-edged sword. These tools are easy to fork, customize, or deploy — a blessing for developers, but a curse when weaponized.

Indicators of Monetization

This isn’t just about using proxies to hide an attacker’s IP. These proxy nodes can be rented or sold on darknet markets, creating a recurring revenue stream for cybercriminals. That adds a financial incentive to keep attacks low-key and ongoing. Unlike ransomware, which burns the victim, this model milks the compromised host over time without alerting its owners.

Detection is Now Harder

Security professionals are increasingly challenged by attacks that don’t “look” malicious. When a forensic analyst sees tinyproxy.conf or sing-box.sh in a system, they might assume it was deployed by a sysadmin. Unless the configuration is audited or the port usage is flagged, these proxies can remain active for weeks or months.

SSH Misconfigurations: The Root Vulnerability

The Achilles heel remains human negligence. Default or reused passwords are still the most common entry point. Despite years of warnings, many Linux users neglect basic hygiene — and these attackers are capitalizing on that with precision.

Countermeasures Need to Evolve

It’s no longer enough to simply install antivirus software or block known malware signatures. Behavioral detection, SSH rate-limiting, geo-fencing, and audit logging need to be standard for any server exposed to the internet. Endpoint Detection and Response (EDR) tools should be trained to flag anomalous installs of legitimate tools, especially if they coincide with brute-force attempts.

The Gray Area of Digital Tools

Finally, this trend exposes a troubling truth: the line between legitimate and malicious software has never been thinner. A tool’s intent depends on its user — and attackers are becoming experts at hiding in plain sight.

🔍 Fact Checker Results:

✅ Legit Proxy Tools Used Maliciously: Confirmed — both TinyProxy and Sing-box are legitimate open-source tools misused in attacks.
✅ SSH Weak Password Exploitation: Verified — attackers rely heavily on brute-force methods.
✅ Proxy Config Manipulation for Global Access: Confirmed — modifications include “Allow 0.0.0.0/0” settings.

📊 Prediction:

Expect this tactic to evolve further, with attackers possibly chaining proxy-based access into multi-stage campaigns, such as data exfiltration or ransomware distribution through layered proxies. We will likely see more malware-less attacks that focus solely on abusing legitimate administration tools. As AI-driven automation becomes accessible to attackers, the scale of these attacks could explode — leaving behind fewer clues and bypassing traditional detection altogether.

References:

Reported By: cyberpress.org
Extra Source Hub:
https://stackoverflow.com
Wikipedia
OpenAi & Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

🔐JOIN OUR CYBER WORLD [ CVE News • HackMonitor • UndercodeNews ]

💬 Whatsapp | 💬 Telegram

📢 Follow UndercodeNews & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | 🔗 Linkedin