New SystemBC Botnet Activity Targets Systems Worldwide
The SystemBC botnet malware has become a critical component in the modern threat landscape, often preceding a full-scale ransomware deployment.

The SystemBC botnet malware has become a critical component in the modern threat landscape, often preceding a full-scale ransomware deployment.
February 4, 2026 | 2 min read

Researchers have identified a new variant of the SystemBC botnet malware, a threat that has been in circulation since 2019 and has been found on machines around the world, including some tied to ransomware intrusions.
The SystemBC botnet malware has become a critical component in the modern threat landscape, often preceding a full-scale ransomware deployment. Law enforcement agencies have been tracking the botnet for many years and in 2024 Europol disrupted part of the SystemBC infrastructure. But that clearly didn’t have the intended effect, as new research from Silent Push shows the botnet is still active and globally distributed.
The new variant the researchers identified is written in Perl and designed to target Linux machines.
“Examining the files that dropped the Perl script revealed two additional ELF binaries: SafeObject and StringHash. The SafeObject file is a UPX-packed variant of StringHash. Once unpacked, it recursively hunts for writable directories before dropping and executing 264 embedded SystemBC payloads, including both ELF and Perl variants,” the Silent Push analysis says.
“Behavior aside, the dropper is unusually noisy and littered with Russian-language strings—an unscientific but familiar clue about the threat actor’s origins.”
Dual Functionality: Proxy and Backdoor
SystemBC's design allows it to serve two primary functions:
Certain variants, including the Windows version, have been observed dropping additional malware alongside ransomware payloads, expanding the potential effects of a compromise and reinforcing the need for early detection.
A History of High-Profile Threat
SystemBC is well-known and the malware was among the families targeted during Europol’s 2024 Operation Endgame, a major coordinated effort aimed at disrupting large-scale dropper malware ecosystems. This attention follows years of public reporting that consistently links SystemBC activity to intrusions that culminate in major ransomware deployment.
Silent Push began tracking SystemBC in 2025, quickly identifying its recurring role in pre-ransomware intrusion campaigns. The researchers developed a SystemBC tracking fingerprint, leading to two major findings:
The infrastructure tied to SystemBC activity in our dataset dates back to 2019, highlighting the longevity of this threat.The Ongoing Threat
While Operation Endgame sought to disrupt this criminal infrastructure, updates from the developer, known as “psevdo,” continue to appear on a Russian-language forum. And much of the activity that Silent Push monitored recently has targeted hosting providers.
“Many infected IP addresses have been reported in VirusTotal comments for engaging in WordPress exploitation activity. Taken together, these observations indicate that threat actors are using SystemBC-associated proxies to target WordPress websites,” Silent Push said.
February 4, 2026 | 2 min read
Dennis Fisher is an award-winning journalist and author. He is one of the co-founders of Decipher and Threatpost and has been writing about cybersecurity since 2000. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. He is the author of 2.5 novels and once met Shaq. Contact: dennis at decipher.sc.