
Summary
This detection rule is designed to identify malicious port forwarding activities through the SSH protocol using the `ssh.exe` executable on Windows systems. Port forwarding via SSH can allow attackers to tunnel their malicious activities or establish a command-and-control (C2) channel by redirecting traffic from one port to another. The rule specifically looks for any instances where `ssh.exe` is invoked with a command line parameter indicating a remote port forwarding setting, specifically those entries containing `-R`. The implemented logic checks for process creation events filtered by the process image path and the command line arguments passed during execution. Its primary objective is to flag suspicious behavior that can be associated with unauthorized remote access or lateral movement within a network. While this rule effectively detects legitimate uses of SSH for remote port forwarding, there may be false positives due to benign administrative uses.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-10-12