
Summary
The detection rule focuses on identifying unauthorized alterations to SSH-related files, specifically "authorized_keys" and "sshd_config," within container environments. SSH keys are vital for secure access, but attackers may manipulate these files to retain persistence on compromised hosts by inserting malicious public keys that allow them ongoing access. By monitoring for changes or creations of these files, the rule helps to uncover potential security breaches that could lead to unauthorized access or lateral movement within a network. The rule triggers alerts based on file events logged from containers, with a high risk score indicating significant concern over the integrity of SSH configurations. Investigative actions suggested include reviewing the associated container ID for alterations, correlating timestamps with legitimate operations, checking the authenticity of user actions, and analyzing network activity for signs of compromise. The rule also recognizes potential false positive scenarios, such as normal operational changes made by automated deployment tools, emphasizing the importance of context in investigating alerts and employing robust response protocols to mitigate threats.
Categories
- Cloud
- Containers
Data Sources
- Container
- File
ATT&CK Techniques
- T1098
- T1098.004
- T1021
- T1021.004
- T1563
- T1563.001
Created: 2023-05-12