heroui logo

OpenCanary - MSSQL Login Attempt Via SQLAuth

Sigma Rules

View Source
Summary
This detection rule monitors login attempts on an MSSQL service hosted on an OpenCanary node using SQL Authentication. OpenCanary is a low-interaction honeypot that emulates various services to attract and detect unauthorized access attempts. The specific log type monitored for this rule is identified by the code 9001. When an event matching this log type occurs, it triggers the alert indicating a potential unwanted SQL authentication attempt. This could signify an attack targeting MSSQL databases, which are often targeted by attackers attempting to gain unauthorized access to sensitive data.
Categories
  • Web
  • Application
  • Infrastructure
Data Sources
  • Application Log
  • Process
Created: 2024-03-08