Advisories

Discover Cryptography News

SSH Attack Vector: Dormant & Forgotten Keys

SSH Attack Vector: Dormant & Forgotten Keys

SSH keys play a critical role in server and network security, yet are too often overlooked by admins, IT professionals and security teams.

SSH keys are everywhere. However, despite their widespread use and high-privilege access, they’re often overlooked by IT and security teams. Meanwhile, malicious actors seek to exploit unmanaged and unprotected keys to perform SSH attacks and spread through networks undetected.

In this blog, we’ll discuss the underlying problem of SSH key sprawl and how to prevent emerging SSH attacks, such as FritzFrog and Lemon_Duck, by implementing proper key management and security practices.

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.