Putty Trojan Backdoor

2 years ago
24

This is a custom technique used to created to backdoor via a SSH client. Threat Actors use this specific technique to hide malware. In this demonstration, I used calc.exe as an example of the payload. In real life scenarios, malicious actors will use a C2 implant as a payload to obtain a stable connection back to their Command and Control Center. Is your organisation safe guarded by this technique?

Loading comments...