
Summary
This detection rule identifies scenarios where a Virtual Network Computing (VNC) service hosted on an OpenCanary node receives a connection attempt. VNC is commonly used for remote desktop access, and such attempts are typically indicators of lateral movement within a network, potentially signifying unauthorized access attempts or reconnaissance by an attacker. The rule is designed to log events when a particular log type, specifically logtype 12001, is triggered. By monitoring these attempts, organizations can proactively respond to potential security incidents involving unauthorized remote access to systems, thereby enhancing their overall security posture. This detection is particularly critical in environments where sensitive information resides, and where VNC ports may be exposed or accessible by untrusted networks or devices. As the rule is categorized under 'high' severity, it emphasizes the importance of such activities being closely monitored and investigated.
Categories
- Network
- Endpoint
- Application
Data Sources
- Application Log
Created: 2024-03-08