A pointer to an article about the existence of a corrupted PuTTY build
ran through my feeds, today.
http://blog.fortinet.com/post/like-putty-in-a-hacker-s-hands
Apparently this was identified in the wild a couple of years ago, and
there are various security filters that have been used in different
places to prevent downloads, catch errant network activity, etcetera.
I know that PuTTY is on the UVM software download page.
https://www.uvm.edu/software/magicscript.php?platform=Windows
Have there been any explicit actions on the UVM network taken to
identify/intercept the bogus PuTTY activity described in the fortinet
article?
--
Scott Turnbull
EPSCoR Software Engineer
|