heroui logo

Teleport SSH Auth Errors

Panther Rules

View Source
Summary
The 'Teleport SSH Auth Errors' detection rule monitors high volumes of SSH authentication errors, which are typically indicative of a potential brute force attack on SSH accounts. When the number of failed authentication attempts exceeds the defined threshold of 10 within a 15-minute deduplication period, an alert is triggered. This is critical in identifying rapidly occurring malicious attempts to gain unauthorized access. The rule references MITRE ATT&CK technique TA0006:T1110, emphasizing its relevance to credential access and brute force strategies. The logged events include attributes such as the time of the event, user information, and specific error codes to provide comprehensive context for the failed login attempts. If excessive authentication failures are detected, it may be necessary to verify the legitimacy of the user's intent to access the system, as outlined in the provided runbook.
Categories
  • Network
  • Endpoint
  • Cloud
  • Infrastructure
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1110
  • T3007
  • T4000
Created: 2022-09-02