Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration

Hackers are increasingly abusing the popular PuTTY SSH client for stealthy lateral movement and data exfiltration in compromised networks, leaving subtle forensic traces that investigators can exploit. In a recent investigation, responders pivoted to persistent Windows registry artifacts after attackers wiped most filesystem evidence.​ Threat actors favor PuTTY, a legitimate tool for secure remote access, […]

The post Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: