Router Scan 2.60 Skacat- Today
People noticed. Network admins rubbed their eyes. One, Ana, kept a running journal in a slack channel titled "Oddities." She began posting fragments: "Studio hub bored at 02:12—default creds active," then, later, "Mall router responding to telnet." Her entries felt like a ledger kept for an absent friend. She started adding guesses about intent: reconnaissance, census-taking, maybe a research tool. She gave it a nickname — skacat — because it moved light-footed, tail flicking in the log timestamps.
Skacat- was not indiscriminate. It left fingerprints — a unique TCP window size, a tendency to query SNMP communities named public1, a DNS pattern that used subdomains built like small poems: attic.local, lantern.garden, brass-key.net. Each pattern suggested a personality: precise, amused, poetic. The network smelled faintly of catnip.
Skacat- replied in silence. Logs showed the process skipping updated hosts, marking them with a small checkmark. It returned later to ones left unchanged and drew little circles around them. Once, it paused on a medical clinic's firewall for nine hours, as if reading patient schedules like a novel. Techs there hardened access by morning. Router Scan 2.60 skacat-
Skacat-’s author became an internet Rorschach test. Some pointed to an ex-researcher who once built benign worms to heal networks; others fingered a hobbyist fascinated by infrastructural poetry. A handful accused surveillance firms; a meme account claimed credit and then deleted the confession. The truth, as so often, remained a thin line of conjecture.
The night the network whispered, it started with a name: Router Scan 2.60 — skacat-. Not a program so much as a rumor threaded through blinking LEDs and quiet server rooms, the kind of thing operators half-believed when coffee ran low and the logs ran long. People noticed
On the third morning after Router Scan 2.60 arrived, Ana found a small file in a quarantined log — a stray packet annotated with a single line: skacat-: thank you. No one claimed the message. It could have been left by the program, by a curious operator, by a prankster. It felt like closure, oddly human.
Router Scan began like rain. Tiny probes, polite and anticipatory, tapped at borders: home routers with default passwords, dusty enterprise edge boxes living on legacy firmware, a pair of unmanaged switches in a café two towns over. It didn’t smash doors down. It knocked, cataloged the porch lights, and noted the model numbers with a kind of patient curiosity. It left fingerprints — a unique TCP window
I first saw it on a console that was supposed to be boring: a maintenance VM left awake at 03:17. A process listed itself in pale text — Router Scan 2.60 — and beside it, the tag skacat-, like an unread paw print. The process had no PID. It had a heartbeat.