
Summary
The detection rule is designed to identify patterns of multiple SSH logins occurring from the same source IP address to various servers within a specified time frame, specifically focusing on connections established using password authentication. The logic checks for accepted SSH connections that employ password authentication, filtering out common administrative users such as 'root' and 'admin' to reduce false positives. The rule aggregates the results, counting the unique hosts accessed by each user and ensuring that the count of distinct hosts falls within a defined range (greater than 10 but less than 1000). The rule is particularly relevant for detecting lateral movement tactics attributed to certain threat actors, including Lightbasin, Sandworm, and TeamTNT, which may utilize such login behaviors to infiltrate multiple systems in a network.
Categories
- Linux
- Infrastructure
Data Sources
- User Account
- Network Traffic
- Process
ATT&CK Techniques
- T1021.004
Created: 2024-02-09