If a VPS running Debian 10 Xfce as a cloud desktop has been rootkit infected and there is an ongoing SSH connection with X2Go from a client to manage this server, is it possible for an attacker on the VPS to hijack the existing SSH connection in order to attack and infect the remote client?
The initial attack vector is executed in the form of browser hijacking (for instance with BeEF) on the cloud desktop, which is used as a "beachhead" to run secondary attacks and modifications on the VPS.
What security measures can be taken to mitigate such an attack and protect the client?