heroui logo

VPCFlow Accepted Inbound SSH

Anvilogic Forge

View Source
Summary
This detection rule monitors and analyzes network traffic specifically focusing on inbound SSH connections through VPC flow logs. It tracks instances where traffic is permitted (action='ACCEPT') and directed towards port 22, which is the default port for SSH. The rule specifically filters for ingress traffic, allowing it to identify potential unauthorized access attempts or security breaches against systems configured to allow SSH connections. The inclusion of the threat actor 'Sandworm (UAC-0165)' suggests a potential association with known threat groups that have exploited SSH vulnerabilities in the past. By flagging instances based on the defined criteria, security teams can quickly respond to suspicious activities and mitigate risks associated with unauthorized access or exploitation attempts.
Categories
  • Network
  • Cloud
  • Infrastructure
Data Sources
  • Volume
ATT&CK Techniques
  • T1133
  • T1190
Created: 2024-02-09