malwaresshkeystospread-ssh2025
2025-11-01
Malware & Hackers Collect SSH Keys to Spread Attack
SSH.com
Unknown date 2025
https://www.ssh.com/academy/malware
Read More
Notes ...
openssh-backdoor-kit
2025-11-01
openssh-backdoor-kit is a suite used to backdoor OpenSSH services
https://github.com/jivoi/openssh-backdoor-kit
Read More
SonicWall
2025-11-01
SonicWall is a cybersecurity company that focuses on firewall and VPN technology.
Read More
SSH malware
2025-11-01
Due to its intended functionality, privilege, and ubiquity, SSH servers and clients are a popular target for malware.
Read More
SSH malware common features
2025-11-01
Common features of SSH malware:
code reuse
Many samples are modified open source tools.
obfuscation: stack strings, xor encryption, UPX, ADD/SUB, ...
Read More
SSH malware research data
2025-11-01
List of ideas for SSH malware research:
SSH malware matrix
like the c2 matrix, but SSH malware. might have to have a few categories: worms, scanners, ...
Read More
ssh-it
2025-11-01
ssh-it is an SSH worm developed by THC.
Read More
ssh-key-backdoor
2025-11-01
ssh-key-backdoor is a technique developed by THC that abuses SSH keys to achieve persistence and lateral movement. ...
Read More
sshdinjector
2025-11-01
sshdinjector is Linux malware attributed to Evasive Panda that is injected into the SSH daemon. ...
Read More
Suricata
2025-11-01
Suricata is a network analysis and threat detection engine used for IDS and IPS systems.
Read More