SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Friday, February 13th, 2026: SSH Bot; OpenSSH MacOS Change; Abused Employee Monitoring

12 snips
Feb 13, 2026
Analysis of a fast self‑propagating SSH worm and its unusual IRC command-and-control technique. A discussion of OpenSSH changes on macOS and a new quantum-safe algorithm warning for older servers. Coverage of how employee monitoring and remote support tools are being misused to run attacker code. Practical reminders to lock down and monitor remote management systems.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

IRC-Backed SSH Worm Observed

  • Jonathan Husk analyzed an SSH worm that uses IRC as a command-and-control channel, a technique Johannes notes hasn't been common lately.
  • The worm tries predictable credentials like "raspberry" and an odd "raspberry 993311" password observed across other bots without clear origin.
INSIGHT

Quantum-Safe Warnings From OpenSSH

  • OpenSSH 10.1+ introduced a client warning about servers lacking quantum-resistant algorithms, and macOS moved from OpenSSH 10.0 to 10.2.
  • The warning doesn't block connections but prompts admins to consider upgrading server cryptography.
INSIGHT

Admin Tools Are Reusable Attack Paths

  • Many legitimate remote management tools include execution features intended for maintenance, which create high-risk abuse paths when compromised.
  • Past incidents show attackers repeatedly weaponize such admin tooling, so this is a recurring operational risk.
Get the Snipd Podcast app to discover more snips from this episode
Get the app