SSH Abuse via Trusted Windows Tooling : PuTTY

SSH Abuse via Trusted Windows Tooling : PuTTY

Threat actors are increasingly repurposing PuTTY, a widely trusted Windows SSH client, as a stealth mechanism for lateral movement, persistence, and data exfiltration inside compromised enterprise environments. Rather than deploying bespoke malware, attackers are blending into legitimate administrative workflows, significantly reducing detection and forensic visibility.

Recent incident response cases show that even when adversaries aggressively erase filesystem artifacts and event logs, PuTTY’s operational footprint leaves behind persistent registry-based evidence that can be used to reconstruct attacker activity.

Why PuTTY Is Attractive to Attackers

PuTTY and its companion binaries (plink.exe, pscp.exe) are commonly present on administrator workstations and jump hosts. Because they are legitimate tools, their execution rarely triggers security alerts unless behavioral context is applied.

Attackers abuse PuTTY to:

  • Establish SSH-based lateral movement without dropping custom implants
  • Tunnel traffic through encrypted channels that evade content inspection
  • Exfiltrate data using standard SCP or SSH port forwarding
  • Masquerade malicious access as routine IT operations

This “living-off-the-land” strategy allows adversaries to maintain a low profile while operating entirely within trusted binaries.

Lateral Movement via SSH on Windows

Once initial access is achieved—often through phishing, trojanized installers, or credential theft—attackers leverage PuTTY to pivot across the environment. Using harvested credentials or reused SSH keys, they authenticate to Linux servers, network appliances, or Windows hosts running OpenSSH.

Because SSH is frequently permitted for administration and automation, east-west movement via PuTTY often bypasses controls that would otherwise flag RDP or SMB-based lateral movement.

In several observed intrusions, attackers chained SSH sessions across multiple hosts using plink.exe, effectively turning compromised systems into temporary jump boxes without deploying additional tooling.

Registry Artifacts: The Forensic Weak Point

Even when attackers remove binaries and clear logs, PuTTY stores SSH connection metadata in the Windows registry:

HKCU\Software\SimonTatham\PuTTY\SshHostKeys

These entries persist across sessions and record:

  • Target IP addresses and hostnames
  • Destination ports
  • SSH host key fingerprints

This registry location acts as a high-fidelity breadcrumb trail, allowing investigators to enumerate every SSH destination accessed from the compromised account. By correlating these keys with authentication logs and network telemetry, responders can reconstruct attacker movement paths even in environments with limited logging.

Tools such as Velociraptor enable rapid hunting across endpoints for these artifacts, making PuTTY registry keys a reliable pivot point during investigations.

Data Exfiltration Using Trusted Channels

PuTTY-based exfiltration typically relies on pscp.exe or SSH port forwarding rather than custom data-stealing malware. Sensitive files are copied directly to attacker-controlled infrastructure using encrypted sessions that resemble legitimate administrative transfers.

In some campaigns, attackers used PuTTY solely for staging data internally before exfiltrating it via other channels, reducing outbound indicators. In others, SSH traffic itself carried the stolen data off-network, blending seamlessly into allowed egress patterns.

Security teams relying purely on signature-based detection or file integrity monitoring often miss this activity entirely.

Trojanized PuTTY as an Initial Access Vector

The threat is compounded by the distribution of trojanized PuTTY installers, frequently delivered through SEO poisoning campaigns targeting Windows administrators. These modified installers deploy backdoors such as Oyster or similar loaders, granting attackers an initial foothold that seamlessly transitions into SSH-based lateral movement.

By abusing trust in a well-known tool, attackers shorten the path from infection to internal compromise.

Detection and Defensive Strategies

Detecting PuTTY abuse requires context-aware monitoring, not binary blocking. Organizations should focus on behavioral baselining and correlation rather than treating PuTTY itself as malicious.

Effective defensive measures include:

  • Monitoring registry changes under SimonTatham\PuTTY for unusual SSH destinations
  • Flagging SSH activity from workstations that do not normally initiate SSH connections
  • Alerting on PuTTY usage from non-admin users or unexpected hosts
  • Correlating SSH traffic with anomalous authentication timing or geography

Network behavior analytics platforms such as Darktrace have proven effective at identifying abnormal SSH patterns following initial compromise, especially when paired with endpoint telemetry.

Patch Hygiene and Access Control

While PuTTY itself is often abused rather than exploited, known vulnerabilities such as CVE-2024-31497 demonstrate that outdated versions can introduce additional risk, including key recovery scenarios that assist persistence.

Organizations should:

  • Keep PuTTY updated across managed systems
  • Rotate SSH keys regularly and eliminate shared credentials
  • Restrict SSH access to hardened jump hosts
  • Enforce strict allowlists for outbound SSH destinations

Conclusion

PuTTY abuse highlights a broader shift in attacker tradecraft: stealth over sophistication. By weaponizing legitimate administrative tools, adversaries minimize their footprint while maintaining full operational capability inside compromised networks.For defenders, the takeaway is clear. Preventing these intrusions is no longer just about blocking malware—it requires deep visibility into how trusted tools are actually used. In modern intrusions, the most dangerous payload may already be installed, signed, and approved.

The challenge is no longer identifying malicious binaries. It’s recognizing when normal tools are being used for abnormal purposes.

Centralise your Appsec

A single dashboard for visibility, collaboration, and control across your AppSec lifecycle.

Explore Live Demo

Read more