Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Attackers use trojanized version of PuTTY to steal SSH credentials

Attackers use trojanized version of PuTTY to steal SSH credentials

2015/05/19

Securityweek - (International) Security researchers at Symantec discovered that actors are using a malicious version of the PuTTY open-source secure shell (SSH) software to access systems remotely and steal data by copying secure server connection info and login details to be sent to an attacker-controlled server. The software bypasses common firewalls and security products due to its whitelisted status and used by system and database administrators and web developers.

Source: http://www.securityweek.com/attackers-use-trojanized-version-putty-steal-ssh-credentials

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:24:19