
Summary
The OSQuery Detected SSH Listener rule is designed to identify whether an SSH (Secure Shell) service is active in non-production environments. SSH is often used for remote administration and can be a vector for lateral movement in an attack scenario. Its presence in a non-production setting may indicate unwanted or malicious persistent access by users or attackers, thereby increasing risk. The rule leverages OSQuery to track the status of SSH listeners, collecting log data that reveals active listening ports that should not be exposed in the environment. If a listener is detected, an investigation is initiated to ascertain the context and determine any potential signs of compromise, followed by the termination of the SSH daemon if necessary. This rule targets environments that require strict adherence to security protocols regarding remote service usage to prevent unauthorized access or exploits.
Categories
- Network
- Endpoint
- Linux
- Cloud
- Application
Data Sources
- Container
- Process
- Network Traffic
ATT&CK Techniques
- T1021
Created: 2022-09-02