I use Secure Shell (SSH) every day because it's one of the most secure ways of connecting to remote machines. It doesn't matter if I'm accessing a machine within my LAN or a system beyond my home network; SSH is the tool I use. SSH is simple. You can connect to a server or desktop with the command: ssh USERNAME@SERVER Where USERNAME is the remote user and SERVER is the IP address or domain of the remote server.
The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system authentication and gain persistent SSH access.