SSH-Snake Credential Theft Malware
A recently discovered threat actor is leveraging an open-source network mapping tool called SSH-Snake to locate private keys and traverse victim infrastructure.
A recently discovered threat actor is leveraging an open-source network mapping tool called SSH-Snake to locate private keys and traverse victim infrastructure.
Two malicious npm packages, warbeast2000 and kodiak2k, were found on the npm package registry, exploiting GitHub to store stolen Base64-encrypted SSH keys.
© 2024 | CyberMaterial | All rights reserved