New Open-Source Self-Modifying Worm Tool SSH-Snake Threatens Networks
The worm autonomously searches for SSH credentials, modifies itself to remain fileless, and uses a variety of methods to collect private keys, making it difficult to detect statically.