Tag: Cyber Security News

Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration

Hackers are increasingly abusing the popular PuTTY SSH client for stealthy lateral movement and data exfiltration in compromised networks, leaving subtle forensic traces that investigators can exploit. In a recent investigation, responders pivoted to persistent Windows registry artifacts after attackers…