Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Banner Ancharia Desktop 1 1
PuTTY Under Siege: Hackers Exploit Popular Client for SSH Attacks

PuTTY Under Siege: Hackers Exploit Popular Client for SSH Attacks

22 December 2025 08:08

Hackers love to exploit the most innocuous tools to infiltrate their targets’ networks, and we all know this.

And in this case, they’re targeting PuTTY , the popular SSH client. It’s like using a disguise to blend in with the “good guys.” Criminal hackers prefer it because it’s like a double agent: it allows them to mix malicious actions with legitimate ones, making it difficult to detect.

A trick to unmask them has been discovered: following the traces left unintentionally in the Windows registry . Attackers are running PuTTY binaries such as plink.exe or pscp.exe to pass from one system to another via SSH tunnels and steal sensitive files without deploying custom malware.

Recently, malware campaigns abusing PuTTY downloads have spread the Oyster backdoor, clearly showing that they can lead to network modifications and data exfiltration through HTTP POST requests.

Security expert Maurice Fielenbach recently reported that despite aggressive log and artifact cleanup, PuTTY stores SSH host keys in the registry under HKCUSoftwareSimonTathamPuTTYSshHostKeys .

The log includes destination IP addresses, ports, and connection signatures, representing a kind of “digital history.” By correlating this data with authentication logs and network flows, investigators can reconstruct the attackers’ paths, even when event logs are insufficient.

Recall that throughout 2025, Windows administrators were targeted by waves of malware involving Trojanized versions of PuTTY, allowing for rapid lateral propagation. Detecting these threats is challenging because PuTTY is part of standard IT workflows; however, malicious tools can often be identified by detecting anomalous RDP scans or irregular SSH traffic following a compromise.

To prevent evasion, it’s crucial for organizations to limit PuTTY use to authorized hosts and regularly rotate SSH keys. Checking for registry keys and SSH activity on non-standard ports should be a priority for security teams.

Additionally, the possibility of exploiting PuTTY vulnerabilities, such as CVE-2024-31497, which allow key recovery and thus improve persistence, can be eliminated by applying the relevant patches.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.