malware or threat actors may add their own public keys to .authorized_keys files as a form of persistence.
SSH key persistence
0001-01-01
Recent Posts
Linux Persistence: atd
2025-04-01 DFIR CTF linux persistence at atd
Linux Persistence: SSH
2025-03-29 DFIR CTF SSH hardening hunting persistence linux persistence hunting hardening SSH PAM