Post

Hackers Weaponize Free SSH Client PuTTY to Deliver Malware on Windows

OpenSSH has become a standard tool for secure remote management on both Linux and Windows systems.

Since its inclusion as a default component in Windows 10 version 1803, attackers have increasingly exploited its presence, leveraging it as a “Living Off the Land Binary” (LOLBIN).

This means adversaries use trusted system tools ssh.exe to evade detection and establish persistent access.

A recent malware sample, disguised as dllhost.exe, demonstrates this abuse.

To read the complete article see:

Link to full article

This post is licensed under CC BY 4.0 by the author.