- Hackers leverage patched OpenSSH to install cryptomining malware on Linux-based systems and IoT devices.
- Backdoor script and trojanized OpenSSH binary allow for persistent SSH access, information harvesting, and installation of rootkits to hide malicious actions.
- Microsoft security researchers recommend secure device configuration, regular updates, limited access privileges, and robust security solutions.