Egress SSH scanning

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect a resource connecting to many external hosts through SSH.

Strategy

Malware that brute forces SSH logins may act as a worm and use the compromised host to brute force other hosts. This can be identified by a large number of SSH connections to many different public IP addresses.

Triage and response

  1. Review the destination IP addresses. Determine if the host is expected to make outbound SSH connections.
  2. Review system authentication logs. Resources exhibiting this behavior are often compromised by SSH brute forcing.
  3. Review Related Signals and relevant logs for additional malicious activity.
  4. Repair the root cause of the compromise.

This detection is based on data from Cloud Network Monitoring.