heroui logo

Unusual SSHD Child Process

Elastic Detection Rules

View Source
Summary
The detection rule titled 'Unusual SSHD Child Process' targets Linux environments specifically monitoring the creation of unusual child processes spawned by the SSH or SSHD processes. Designed to help security teams identify potential persistence mechanisms utilized by attackers, this rule uses 'new_terms' to keep track of anomalies within process creation events that may hint at malicious activities. The rule employs a query that checks if the parent process is SSH or SSHD, ensuring that the command-line arguments are atypical—specifically looking for scenarios where only two arguments are passed which diverge from standard shell behavior. By focusing on these criteria, the rule aims to catch unauthorized access and aids security analysts in determining if there have been any compromises in the system, enabling a proactive approach to incident response and remediation.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1546
  • T1546.004
  • T1021
  • T1021.004
  • T1563
  • T1563.001
Created: 2024-12-16