Connecting to LinkedIn...



SSH keys are security Achilles Heel for most organisations

24/02/2014 by


Most organisations have insufficient security controls against rogue, root-level access and cyber-attacks. That is the finding of a new study from the Ponemon Institute, “2014 SSH Security Vunerability Report: Information Technology’s Dirty Secret and Open Backdoors.”

The report was underwritten by Venafi, a leading cybersecurity company in Next-Generation Trust Protection applications.

How bad is the problem? Unprotected SSH (secure shell) cryptographic keys make nearly every enterprise server, virtual machine and cloud service vulnerable to cyberattacks, the report says.

Consider some study findings:

Three out of four enterprises have no security controls for SSH, which provides cyber attackers with root access
Over half of enterprises acknowledge that their organizations have already experienced an SSH-related compromise
Yet 46 percent of enterprises do not rotate or change SSH keys, in spite of the fact that SSH keys never expire, which means this represents a perpetual vulnerability
According to the report highlights, “cybercriminals are exploiting the lack of visibility and control over SSH keys used to authenticate administrators, servers and clouds.” In fact, 46 percent of the 1,854 IT professionals surveyed said their servers and networks are left open and can be owned forever by attackers because they fail to rotate SSH keys.

“Not surprisingly, 51 percent of organizations reported already being breached by an attack using SSH,” the study noted.

The bad news get worse, the report says, since this vulnerability has not gone unnoticed.

“The recently uncovered Mask operation steals SSH keys to impersonate, surveil, collect, and decrypt its target’s communications and data. If SSH keys are not replaced after intrusions like the Mask attacks, enterprise networks remain owned by the attackers,” the report said.

A majority of organizations would also have little way of knowing if they have been the victim of an attack initially. 60 percent of respondents said they could not detect rogue SSH keys on their network since their system administrators use manual processes to monitor and police SSH keys.

“Global organizations are under attack, and the attackers are more dangerous and persistent than ever,” the report said. “Armed with a litany of next-generation cybercrime tools, they’re vastly different from yester-year hackers and better enabled with targeted and persistent tools.”, please click on this link to read the article in full

Montash is a multi-award winning , global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

For more information please contact us on +44 (0) 20 7014 0230 or alternatively send us an email on

comments powered by Disqus

Social Stream

Latest News


What Does A Snap Election Mean For Recruitment?

2017-04-25 08:00:00 +0100

On Tuesday 18th April, Prime Minister Theresa May called a snap general election for 8th June, taking the nation by surprise. Rather than waiting until 2020, voters will now be casting their ballots in a matter of weeks. The hope for the government is that a Tory victory give the prime minister a strong mandate in parliament as Brexit negotiations begin. This sudden decision has been embraced by many in the recruitment industry due to the anticipated st...


Evolve or Die: The Importance of Being Agile

2017-04-19 18:00:00 +0100

In the high-speed world of IT, agility is essential if you want to stay on top. Over the last 20 years, Montash Managing Director Roy Dungworth has experienced many changes in the industry. But two things never change - the need for business agility and the importance of people. Roy shares his insights after two decades in the industry. The pace of the IT industry increases every year. The way people buy or consume information today is having an enormou...