Our server may have been compromised, and we suspect an attacker has gained access via SSH. We need to regain control without alerting the threat actor, to avoid escalation or further damage. What steps can we take to secure the server and restore access stealthily? Are there tools or techniques that can help in such a situation?