1 min read

Spike in SSH Scans Signals Imminent Credential‑Theft Campaigns

Spike in SSH Scans Signals Imminent Credential‑Theft Campaigns

The Internet Storm Center’s daily report shows a sharp increase in SSH scanning traffic over the past 48 hours, with observed connection attempts up ≈ 250 % compared to the baseline. The scans are originating from a dispersed set of IP ranges and target port 22 on both public‑facing and VPN‑exposed hosts, employing fast‑retry and credential‑guessing patterns typical of automated reconnaissance tools.

This surge is a strong indicator that threat actors are mapping SSH services to harvest valid credentials before launching broader attacks such as ransomware or data exfiltration. Defenders should prioritize reviewing SSH logs for anomalous login attempts, enforce key‑based authentication, and ensure that brute‑force protections (e.g., rate limiting, account lockout) are active. Early detection and hardening of SSH endpoints can disrupt the attackers’ initial foothold and mitigate the risk of subsequent payload delivery.

Categories: Threat Intelligence, Identity & Access Management

Source: Read original article