
Summary
This detection rule focuses on identifying the creation of SSH key files within the user's home directory, specifically the `~/.ssh/` path on Linux systems. It utilizes Sysmon for Linux to monitor filesystem events and reacts to new file creation events that correspond to this sensitive directory. This behavior is notable as it may signal malicious activity; adversaries often generate SSH keys to establish unauthorized persistent access or to escalate privileges on a compromised host. If an attacker successfully creates an SSH key, they could exploit the OpenSSH daemon for remote access, leading to severe security implications such as unauthorized control of the system and potential data breaches. The analytic employs a structured search to aggregate instances of SSH key file creation, facilitating the identification of potentially harmful behaviors while allowing security teams to respond promptly to such anomalies.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Process
ATT&CK Techniques
- T1098
- T1098.004
Created: 2024-11-13