Detectionhightest

OpenCanary - SSH New Connection Attempt

Detects instances where an SSH service on an OpenCanary node has had a connection attempt.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Security Onion SolutionsCreated Fri Mar 08cd55f721-5623-4663-bd9b-5229cab5237dapplication
Log Source
opencanaryapplication
Productopencanary← raw: opencanary
Categoryapplication← raw: application
Detection Logic
Detection Logic1 selector
detection:
    selection:
        logtype: 4000
    condition: selection
False Positives
Unlikely

False positives are unlikely for most environments. High confidence detection.

Rule Metadata
Rule ID
cd55f721-5623-4663-bd9b-5229cab5237d
Status
test
Level
high
Type
Detection
Created
Fri Mar 08
Path
rules/application/opencanary/opencanary_ssh_new_connection.yml
Raw Tags
attack.privilege-escalationattack.defense-evasionattack.initial-accessattack.lateral-movementattack.persistenceattack.t1133attack.t1021attack.t1078
View on GitHub