
Summary
This detection rule focuses on identifying a potential security threat involving the creation of privileged accounts on Cisco IOS devices followed by suspicious SSH activities. The correlation of events is determined by incidents indicating 'Cisco IOS Suspicious Privileged Account Creation' alongside SSH-related alerts that flag connections to non-standard ports or specific SSH daemon operations (sshd_operns). This analytic serves as an early warning mechanism for potential persistence threats that could occur following an initial compromise, as unauthorized privileged account creation followed by anomalous SSH connections are signs of a possible attacker's attempt to maintain long-term access to a compromised system. This rule is designed to function by querying network security logs for signs of these correlated events and will only trigger when both types of events are detected within a 24-hour period on the same network device. The health of the correlation depends on the proper configuration of detection events and the ingestion of Cisco logs from relevant sources to ensure accurate detection and prevention of potential breaches.
Categories
- Network
Data Sources
- Logon Session
- Network Traffic
- Application Log
ATT&CK Techniques
- T1021.004
- T1136
- T1078
Created: 2026-01-06