Source: www.bleepingcomputer.com – Author: Bill Toulas A threat actor is using an open-source network mapping tool named SSH-Snake to look for private keys undetected and move laterally on the victim infrastructure. SSH-Snake was discovered by the Sysdig Threat Research Team (TRT), who describe it as a “self-modifying worm” that stands out from traditional SSH worms by avoiding […]
La entrada New SSH-Snake malware steals SSH keys to spread across the network – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.