Detectionlowtest

Cisco BGP Authentication Failures

Detects BGP failures which may be indicative of brute force attacks to manipulate routing

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Tim BrownCreated Mon Jan 09Updated Mon Jan 2356fa3cd6-f8d6-4520-a8c7-607292971886network
Log Source
Ciscobgp
ProductCisco← raw: cisco
Servicebgp← raw: bgp

Definition

Requirements: cisco bgp logs need to be enabled and ingested

Detection Logic
Detection Logic1 selector
detection:
    keywords_bgp_cisco:
        '|all':
            - ':179' # Protocol
            - 'IP-TCP-3-BADAUTH'
    condition: keywords_bgp_cisco
False Positives

Unlikely. Except due to misconfigurations

Rule Metadata
Rule ID
56fa3cd6-f8d6-4520-a8c7-607292971886
Status
test
Level
low
Type
Detection
Created
Mon Jan 09
Modified
Mon Jan 23
Author
Path
rules/network/cisco/bgp/cisco_bgp_md5_auth_failed.yml
Raw Tags
attack.initial-accessattack.persistenceattack.privilege-escalationattack.defense-evasionattack.credential-accessattack.collectionattack.t1078attack.t1110attack.t1557
View on GitHub