./sshrd.sh --target bastion.corp.local --jump dr-vm.internal --payload restore_toolkit.tar.gz
The terminal spat out lines:
The attackers had left one thread uncut: the bastion’s outbound SSH keys to a tiny, off-site disaster recovery VM in a different cloud region. The VM had no public IP, no DNS—just a hidden internal address reachable only via the bastion. If Lin could jump through the bastion and push a clean restore script onto that VM before the malware spread there too… sshrd script
[sshrd] Generating jump chain... [sshrd] Sending payload (via bastion -> dr-vm)... [sshrd] Executing remote command... [sshrd] Waiting for completion (30s timeout)... a new line appeared:
Then, a new line appeared: