![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzS9ApKf9qeb9o5Y2LcxqESomxrcUsYmTXjjGug5b2i3K6lYD7hYx8NFXWeIn8msh3hr0yy3jUJ4RWf8n6hD4k8jiJO9Dz1vW3CBCcmwKG-a_1Lx5HES3csVB9x8x1dqVUMgnveroustRiN-KDgmlan9KUFpVFoxs33LSvrNmJegzA5kZXvzB-SPmU0PMk/s1600/ssh-malware.jpg)
A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat actors to conduct malicious activities.
“SSH-Snake is a self-modifying worm that leverages SSH credentials discovered on a compromised system to start spreading itself throughout the network,” Sysdig researcher Miguel Hernández said.
“The worm automatically searches through known credential
Source:: The Hackers News