Improve description and false positives for Linux security tool disablement detection#5853
Improve description and false positives for Linux security tool disablement detection#5853amittrap wants to merge 4 commits intoSigmaHQ:masterfrom
Conversation
…lement detection Enhances the description to clarify the detection of attempts to disable Linux security services and adds more context on potential false positives.
Improve description and false positives for suspicious OpenSSH error detection
| - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.004/T1562.004.md | ||
| author: Ömer Günal, Alejandro Ortuno, oscd.community | ||
| date: 2020-06-17 | ||
| modified: 2022-11-26 |
There was a problem hiding this comment.
Modified date needs to be updated
| - 'Failed password' | ||
| - 'Invalid user' | ||
| - 'authentication failure' | ||
| - 'PAM authentication failure' |
There was a problem hiding this comment.
PAM is not linked to SSH so PAM authentication failure could mean many tihngs.
Also the other strings you are using are generic since you are reading this from syslog. So you cannot call this an SSH bruteforce.
I suggest you update the metadata to reflect that auth failures are in place or something similar and worth investigating.
| - Unknown | ||
| - Rare SSH client compatibility issues | ||
| - Corrupted or malformed SSH traffic due to network issues | ||
| - Security testing, vulnerability scanning, or fuzzing activity |
There was a problem hiding this comment.
These are not FPs but potentially accepted TPs. So we do not list them
| - Security testing, vulnerability scanning, or fuzzing activity |
| description: > | ||
| Detects suspicious or fatal OpenSSH daemon error messages that may indicate | ||
| exploitation attempts, malformed authentication traffic, or protocol abuse | ||
| targeting the SSH service. Such errors are commonly observed during | ||
| vulnerability scanning or active exploitation. |
There was a problem hiding this comment.
| description: > | |
| Detects suspicious or fatal OpenSSH daemon error messages that may indicate | |
| exploitation attempts, malformed authentication traffic, or protocol abuse | |
| targeting the SSH service. Such errors are commonly observed during | |
| vulnerability scanning or active exploitation. | |
| description: | | |
| Detects suspicious or fatal OpenSSH daemon error messages that may indicate exploitation attempts, malformed authentication traffic, or protocol abuse targeting the SSH service. | |
| Such errors could be a sign of vulnerability scanning or active exploitation attempts. |
| description: > | ||
| Detects attempts to stop or disable common Linux security services such as | ||
| firewalls and endpoint protection agents via system log messages. Adversaries | ||
| may disable security tooling to evade detection and maintain persistence. | ||
|
|
There was a problem hiding this comment.
| description: > | |
| Detects attempts to stop or disable common Linux security services such as | |
| firewalls and endpoint protection agents via system log messages. Adversaries | |
| may disable security tooling to evade detection and maintain persistence. | |
| description: | | |
| Detects attempts to stop or disable common Linux security services such as firewalls and endpoint protection agents via system log messages. | |
| Adversaries may disable security tooling to evade detection and maintain persistence. |
| within system log messages. Such activity is commonly associated | ||
| with credential stuffing or password guessing attacks. | ||
| references: | ||
| - https://attack.mitre.org/techniques/T1110/ |
There was a problem hiding this comment.
No need for MITRE links since we already have tags.
| - https://attack.mitre.org/techniques/T1110/ |
I’ve added an additional Sigma rule to detect SSH brute-force authentication
attempts via Linux syslog as part of this branch. If preferred, I can split
this into a separate pull request for clarity.