When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
It is also a lot stealthier as it avoids easily detectable patterns, usually associated with scripted attacks.
The script is also described as essentially plug-and-play, but easily customizable.
Threat actors can disable and enable different parts, depending on their strategy.
SSH-Snake also works on any equipment.
Besides grabbing credentials, SSH-Snake also grabs target IP addresses and bash history.
The tool also seems to be growing in popularity, as TRT says its witnessing the victim list growing.
At the time of writing, the number of victims is approximately 100, they concluded.