Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Trojanized, info-stealing PuTTY version lurking online (SSH Secure Shell program for Windows)
Help Net Security ^ | May 19, 2015 | Zeljka Zorz

Posted on 05/19/2015 5:17:01 PM PDT by dayglored

A malicious version of the popular open source Secure Shell (SSH) client PuTTY has been spotted and analyzed by Symantec researchers, and found to have information-stealing capabilities.

PuTTY, which is written and maintained primarily by Simon Tatham and can be freely downloaded from the project's official site, is a popular software with admins and developers looking to connect to remote servers through encrypted means.

Compiled from source, this malicious version is apparently capable of stealing the credentials needed to connect to those servers.

"Data that is sent through SSH connections may be sensitive and is often considered a gold mine for a malicious actor. Attackers can ultimately use this sensitive information to get the highest level of privileges on a computer or server, (known as 'root' access) which can give them complete control over the targeted system," the researchers explained.

They noted that this particular malicious version of PuTTY has already been spotted in the wild in 2013, but it wasn't broadly distributed.

Neither is this time: there is not active or targeted malware distribution campaign - unsuspecting users will download it only if they search for the legitimate software via a search engine, and opt for getting it from a compromised site instead of the project's official site.

"There is evidence to show users that the Trojanized version of PuTTY is suspicious, as the file is much larger in size than the latest official release. If users are not paying attention to the program’s file size, they may accidentally end up using the malicious version," the researchers noted.

One way to check whether you have perhaps installed it is to check the software's About information. The malicious version will show you this:

"To ensure that you don’t become a victim to malicious versions of legitimate software, always ensure that the page you are downloading from originates from the author or publishers’ official home page," the researchers advise.


TOPICS: Business/Economy; Computers/Internet; Hobbies
KEYWORDS: malware; putty; windows; windowspinglist
Bad news... The famous PuTTY Secure Shell (SSH) is a trusted tool of users in all avenues of Windows computing.

The real deal is found here:

http://www.chiark.greenend.org.uk/~sgtatham/putty/

More information on the malware version from Symantec:

Symantec Security Blog

1 posted on 05/19/2015 5:17:01 PM PDT by dayglored
[ Post Reply | Private Reply | View Replies]

To: dayglored; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; Alas Babylon!; amigatec; ...
Windows Users Beware -- malware-laden version of well-known SSH client "PuTTY" in the wild ... PING!

You can find all the Windows Ping list threads with FR search: search on keyword "windowspinglist".

2 posted on 05/19/2015 5:18:01 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Whoa interesting, I install putty for folks at work, thanks for the link.


3 posted on 05/19/2015 5:25:26 PM PDT by the_individual2014
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Use PowerShell!

Set-PSSessionConfiguration -ShowSecurityDescriptorUI -Name Microsoft.PowerShell -Force


4 posted on 05/19/2015 5:27:01 PM PDT by Alas Babylon! (As we say in the Air Force, "You know you're over the target when you start getting flak!")
[ Post Reply | Private Reply | To 2 | View Replies]

To: dayglored

What’s a non-geek supposed to do? We’re like PuTTY in their hands?


5 posted on 05/19/2015 5:31:00 PM PDT by BipolarBob
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Thanks for the warning - mine is secure. Nice little utility, been using it for years. BTT


6 posted on 05/19/2015 5:34:29 PM PDT by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

The graphic shows 2013 - has this infected version been out there in the wild this long?


7 posted on 05/19/2015 5:36:17 PM PDT by kingu (Everything starts with slashing the size and scope of the federal government.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alas Babylon!
> Use PowerShell! Set-PSSessionConfiguration -ShowSecurityDescriptorUI -Name Microsoft.PowerShell -Force

Tell me more. I didn't realize PowerShell could be used as an SSh client. What SSh options and features does it support?

8 posted on 05/19/2015 5:59:20 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: kingu
> The graphic shows 2013 - has this infected version been out there in the wild this long?

I dunno. Might just be that the 2013 version was the one they corrupted.

9 posted on 05/19/2015 6:00:25 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: dayglored; Alas Babylon!
That command will set the permissions on the default remote PSSession (so that someone who's not a local admin can use the session). It's remote access, but not SSH.

That's not to say that you can't do SSH with Powershell:

Posh-SSH

10 posted on 05/19/2015 6:11:35 PM PDT by tacticalogic ("Oh, bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: tacticalogic; Alas Babylon!
> That's not to say that you can't do SSH with Powershell: Posh-SSH

Huh, I'll be darned. That's useful! Thanks!

11 posted on 05/19/2015 6:24:03 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: dayglored

Welcome!


12 posted on 05/19/2015 6:29:23 PM PDT by tacticalogic ("Oh, bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: dayglored

How can you protect yourself against this and similar trojans?


13 posted on 05/19/2015 7:55:28 PM PDT by Democrat_media (Obama illegally got his FCC gestapo to impose SOROS' regulations on Internet)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

Now, THAT sucks!


14 posted on 05/19/2015 8:18:49 PM PDT by KoRn (Department of Homeland Security, Certified - "Right Wing Extremist")
[ Post Reply | Private Reply | To 2 | View Replies]

To: Democrat_media
> How can you protect yourself against this and similar trojans?

My rule is to always, always obtain software from the company that makes it, not a third-party, and especially not an unknown third party or one who promises something for nothing.

There is no free lunch if the software originally cost money. If the software is really free, get it from the guy who wrote it, for free. But if the guy who wrote it charges, then getting it elsewhere "for free" is likely to cost you bigtime. Pony up and pay him what he charges, or don't use it and find something else.

15 posted on 05/19/2015 8:28:12 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: dayglored

I much prefer SecureCRT. Yea for responsible software ownership!


16 posted on 05/21/2015 9:39:10 AM PDT by ro_dreaming (Chesterton, 'Christianity has not been tried and found wanting. ItÂ’s been found hard and not tried')
[ Post Reply | Private Reply | To 2 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson