Hackers Weaponize Free SSH Client PuTTY to Deliver Malware on Windows
OpenSSH has become a standard tool for secure remote management on both Linux and Windows systems.
Since its inclusion as a default component in Windows 10 version 1803, attackers have increasingly exploited its presence, leveraging it as a “Living Off the Land Binary” (LOLBIN).
This means adversaries use trusted system tools ssh.exe to evade detection and establish persistent access.
A recent malware sample, disguised as dllhost.exe, demonstrates this abuse.
To read the complete article see:
This post is licensed under CC BY 4.0 by the author.