
Summary
The rule identifies potential brute force attacks on user accounts on macOS through the monitoring of the SSH key generation process ('sshd-keygen-wrapper'). Specifically, it triggers an alert when there are 20 or more executions of this process from the same host within a given time frame. This unusual behavior suggests the possibility of an adversary attempting to generate unauthorized access keys to compromise user accounts. The rule uses data from Elastic Defend, requiring specific setup steps to ensure it can monitor process events on macOS systems. This includes integrating Elastic Defend with the Elastic Agent to enable the necessary log data collection. The rule is categorized as medium risk with a risk score of 47 and is designed to enhance detection capabilities against credential access tactics outlined in the MITRE ATT&CK framework, particularly under the 'Brute Force' technique.
Categories
- Endpoint
- macOS
Data Sources
- Process
- Application Log
- Network Traffic
ATT&CK Techniques
- T1110
Created: 2020-11-16