SSH-Snake, a network mapping tool, has been adapted by hackers to stealthily find and use private SSH keys for lateral movements in targeted networks. Identified by Sysdig as a self-altering worm, it diverges from standard SSH worms by avoiding predictable attack patterns. Launched on January 4, 2024, it’s a bash script that self-modifies to minimize detection, scanning directories, shell histories, and system logs to find SSH credentials. Sysdig confirmed its use after detecting a C2 server storing data from around 100 victims, indicating the exploitation of Confluence vulnerabilities for access. SSH-Snake represents a significant evolution in malware, exploiting the widely used SSH protocol in businesses.

  • Rob Bos
    link
    fedilink
    79 months ago

    This is why I keep my ssh credentials on a flash drive and add it to ssh agent for time limited periods. Adds some insulation.

  • Po Tay Toes
    link
    fedilink
    English
    49 months ago

    I only send shell commands in the mail to my vps providers.

  • @IphtashuFitz
    link
    English
    29 months ago

    SSH keys should always have paraphrases.

    • @[email protected]
      link
      fedilink
      English
      2
      edit-2
      9 months ago

      At the very least keys without passphrases (such as for automated tasks) should restrict what commands can be run, should not give access to an interactive shell, and should go to a very specific user with as little file system access as is necessary to do the task. If an automated ssh task is giving access to the places you put your private keys and bash history, you’re probably doing something very wrong.