heroui logo

OpenCanary - SSH Login Attempt

Sigma Rules

View Source
Summary
The OpenCanary SSH Login Attempt detection rule identifies potential unauthorized access attempts to an SSH service running on an OpenCanary node. OpenCanary is a low-interaction honeypot that simulates various network services to detect and log suspicious activities. This detection utilizes the logging mechanisms provided by OpenCanary to analyze login attempt logs (logtype 4002) for any suspicious activity. By monitoring the SSH service, the rule aims to capture and alert on any attempts that could signify initial access or lateral movement within a network. The rule can also potentially indicate persistence behavior where an attacker tries to maintain access after breaching a system. Given its high level of severity, this rule is essential for organizations utilizing OpenCanary, as it helps to reveal potential threats early in their lifecycle.
Categories
  • Network
  • Cloud
  • Application
Data Sources
  • Application Log
  • User Account
  • Process
Created: 2024-03-08