SSH CryptoAuditor: Cryptocurrency Mining Malware Threat Report & Webinar
According to freshly delivered telemetry from a CryptoAuditor in SSH, A large number of organizations running into tens of thousands have been attacked.
On the 21st of June 2018 at about 2:00pm a fireside chat style webinar was announced by SSH Communications Security. This was to converse upon its discoveries with regards the threat research report that was just released. This report will be specifically sent to Webinar attendees and would be solely based on the telemetry gotten from CryptoAuditor with SSH.
The details of the report unveil the fact that attacks on SSH are steadily on the rise. According to it, a huge number of the public facing SSH servers amounting to tens of thousands which are primarily geared at government, enterprise and financial environments have come under fierce attack and the most recent culprits are not far fetched. These culprits are the GoScan SSH and Operation Prowli.
Targeting SSH CryptoAuditor
The details of this recent discovery provides the fact that only SSH servers are the victims of this malicious hunt, as GoScan SSH and Prowli aim to install into the SSH servers crypto mining malware as well as exfiltrate data of a sensitive nature.
Asides from the fact that this hunt was targeted solely on SSH servers, the numbers of attempts in one day are staggering. A whopping 13,000 connections was discovered to be attempted after SSH Communications Security put together an inquiry with little or no preparation due to the urgent situation of things.
SSH CryptoAuditor Crypto Mining Malware Threat Report & Webinar Solutions
The first attack on SSH of this kind occurred twenty years back. It was reported in the year 1998. Due to the fact that it's not an ideal situation, it has become easily solvable and completely capable of being prevented. That said, the reason behind their ease of attack as well as their steady rise is nothing but the migration to the cloud. The possible solutions to this present situation are narrowed into three. These when applied would effectively keep organizations servers secure.
One of SSH Communications Security senior solutions architect, no other than Craig Riddell, spoke from a position of knowledge when he expressly stated that a good number attacks have been targeted at SSH..
However, Operation Prowli Malware as well as GoScan SSH are the most recent to the scene. The good news according to him is based on the fact that these attacks are far from complex in their approach and thus can be easily warded off. He ended by stating that well detailed information on how to totally get rid of the extremely dangerous threat in their fireside chat would be made available to attendees.
SSH CryptoAuditor Security
SSH Communications Security (NASDAQ OMX) is basically a leading provider of cybersecurity solutions for enterprise that primarily monitors, controls as well as automates a trusted and sure ease of passage to vital data. We have over the years gained the trust of our customers globally, especially with regards to our Key Manager® centered on flagship Universal SSH.
Also several other of our available solutions to upgrade security level, manage access and finally achieve compliance have been pivotal to earning our customers world wide trust.SSH also engages in direct sales through several offices in Asia, North America, Europe and via a worldwide link of partners that have been duly certified.