OpenSSH Secure Copy Client (scp.exe)
scp.exe is the OpenSSH Secure Copy client for Windows, used to securely transfer files between a local PC and a remote host over SSH. It supports options for recursive copying, preserving metadata, port specification, and identity files, and is commonly used in automation, backups, and deployments. It is a command-line tool.
scp.exe implements the Secure Copy protocol as part of OpenSSH. It copies files over networked hosts using SSH encryption, allowing flags like -r, -p, -C, -i, and -P to control recursion, permissions, compression, identity, and ports for secure transfers.
scp.exe is safe when obtained from official OpenSSH distributions or reputable Windows ports (Microsoft OpenSSH, Git for Windows, or a trusted SSH client suite). It does not install or execute without user or script initiation. Verify the source, digital signatures, and path to ensure the binary has not been swapped by malware. Regular system security hygiene reduces risk, and scanning the binary with an up-to-date antivirus is prudent, especially on endpoints exposed to external networks.
In normal conditions, scp.exe is not a virus. However, attackers may package malicious copies under the same name or place a renamed executable in a deceptive folder. Always confirm the file's provenance, check its digital signature, and compare its hash with the official OpenSSH release. If scp.exe appears in an unexpected directory or starts transferring data without a user request, treat it as suspicious and investigate.
Red Flags: Unexpected paths, absence of a valid signature, a mismatch in file size with official releases, or unexplained network activity by scp.exe are indicators that warrant investigation and containment.
Reasons it's running:
scp.exe is the OpenSSH Secure Copy client used to transfer files securely between a local machine and a remote SSH server. It is commonly invoked in scripts, CI jobs, and manual transfers.
Not by default. A legitimate scp.exe is part of OpenSSH. If you find scp.exe in an unexpected folder or without a valid signature, treat it as suspicious and verify its source.
Check its location, verify the digital signature, compare its hash to the official release, and scan with a trusted antivirus.
If you do not rely on SSH-based file transfers, you can uninstall the OpenSSH client or delete the scp.exe file from its known location; ensure no scripts depend on it.
Open a command prompt and run: scp [options] sourcefile user@remotehost:/path/target. Use -r for directories and -P to specify a non-default port.
High resource use usually indicates a large transfer or an inefficient script; check network throughput, enable verbose mode (-v) to see progress, and monitor the destination server.