heroui logo

SSH Pivoting

Anvilogic Forge

View Source
Summary
The SSH Pivoting detection rule is designed to identify incidents of SSH pivoting activity, which is a common technique used by threat actors to move laterally within a network after gaining initial access. This rule captures events associated with SSH session starts and ends on Unix endpoints, filtering for successful connections to the SSH daemon ('sshd'). The detection logic focuses on key attributes such as user identity, source IP, and session duration, leveraging Splunk's data retrieval functions. It identifies anomalous session behaviors based on session duration and the number of distinct source IPs associated with user sessions. The rule specifically targets behaviors attributed to known threat actor groups like the Daixin Team, Lightbasin / UNC1945, and TeamTNT. Key output fields include time of activity, user information, session duration, and associated IP addresses, facilitating an understanding of potential lateral movement and malicious activities within the infrastructure.
Categories
  • Linux
  • Endpoint
Data Sources
  • User Account
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1021.004
  • T1021
Created: 2024-02-09