Come on....
That's just painfully wrong. They attackers turned on SSH on a specific port, created an additional login and turned off security functions. Those are all VERY detectable.
The ACTUAL information from GreyNoise says
You could say "the attackers took steps to try and avoid...