Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks,
A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat actors to conduct malicious activities.
« SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network, » Sysdig researcher Miguel Hernández said.
« The worm automatically searches through known credential
« SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network, » Sysdig researcher Miguel Hernández said.
« The worm automatically searches through known credential
,
A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat actors to conduct malicious activities.
« SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network, » Sysdig researcher Miguel Hernández said.
« The worm automatically searches through known credential
« SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network, » Sysdig researcher Miguel Hernández said.
« The worm automatically searches through known credential
, ,
https://thehackernews.com/2024/02/cybercriminals-weaponizing-open-source.html