Evasive Panda Unleashes SSH Shenanigans: Chinese Hackers Play Hide and Seek with Network Appliances
Evasive Panda, a Chinese hacking group, is back with the ELF/Sshdinjector.A!tr attack suite, injecting malware into SSH daemons. Their stealthy moves include system reconnaissance, credential theft, and remote command execution. Fortiguard researchers are on the case, using AI to unravel these digital hijinks.

Hot Take:
Looks like the Evasive Panda group is up to their old tricks, but this time they’ve got a new toy: a fancy SSH daemon injection that’s sneakier than your cat stealing food off the table. With these Chinese hackers, it seems like the only thing more persistent than their malware is their ability to keep surprising us with their creativity. If only they’d channel that energy into something less…illegal.
Key Points:
- The Chinese hacking group, known as Evasive Panda or DaggerFly, is injecting malware into the SSH daemon of network appliances.
- The attack suite, identified as “ELF/Sshdinjector.A!tr,” has been active since November 2024.
- The malware boasts fifteen commands for extensive system manipulation and data theft.
- Fortinet’s FortiGuard researchers are using AI-assisted tools to analyze the malware, despite some challenges.
- FortiGuard AntiVirus service detects the threat, providing protection for their customers.
Already a member? Log in here