Print

Print


A pointer to an article about the existence of a corrupted PuTTY build  
ran through my feeds, today.

http://blog.fortinet.com/post/like-putty-in-a-hacker-s-hands

Apparently this was identified in the wild a couple of years ago, and  
there are various security filters that have been used in different  
places to prevent downloads, catch errant network activity, etcetera.

I know that PuTTY is on the UVM software download page.

https://www.uvm.edu/software/magicscript.php?platform=Windows

Have there been any explicit actions on the UVM network taken to  
identify/intercept the bogus PuTTY activity described in the fortinet  
article?


-- 
Scott Turnbull
EPSCoR Software Engineer