-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create new rule - Potential SSH Tunnel Persistence Install Using A Scheduled Task #5146
base: master
Are you sure you want to change the base?
Conversation
Submission of new proposed rule to detect the creation of Scheduled tasks that use OpenSSH to establish an SSH tunnel to attackers server.
Updated spelling mistake
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Welcome @resp404nse 👋
It looks like this is your first pull request on the Sigma rules repository!
Please make sure to read the SigmaHQ conventions document to make sure your contribution is adhering to best practices and has all the necessary elements in place for a successful approval.
Thanks again, and welcome to the Sigma community! 😃
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Only yaml review , I did not check the logic detection.
I am AFK for holidays.
references: | ||
- https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/ | ||
- https://www.kroll.com/en/insights/publications/cyber/cactus-ransomware-prickly-new-variant-evades-detection |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
references: | |
- https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/ | |
- https://www.kroll.com/en/insights/publications/cyber/cactus-ransomware-prickly-new-variant-evades-detection | |
references: | |
- https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/ | |
- https://www.kroll.com/en/insights/publications/cyber/cactus-ransomware-prickly-new-variant-evades-detection |
- attack.commandandcontrol | ||
- attack.T1053.005 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- attack.commandandcontrol | |
- attack.T1053.005 | |
- attack.command-and-control |
https://github.com/SigmaHQ/sigma-specification/blob/main/appendix/sigma-tags-appendix.md
condition: all of selection_* | ||
falsepositives: | ||
- Unknown | ||
level: high |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
level: high | |
level: high | |
- https://www.kroll.com/en/insights/publications/cyber/cactus-ransomware-prickly-new-variant-evades-detection | ||
author: Rory Duncan | ||
date: 2024-12-30 | ||
modified: 2024-12-30 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
modified: 2024-12-30 |
As it is a new rule no need to modified it already 😉
Summary of the Pull Request
Create new rule Potential SSH Tunnel Persistence Install Using A Scheduled Task
Changelog
new: Potential SSH Tunnel Persistence Install Using A Scheduled Task
Example Log Event
Fixed Issues
SigmaHQ Rule Creation Conventions