이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.WARNING: This rule will be deprecated on 20 October 2025.
See the announcement for more information.
Goal
Detect a resource connecting to many external hosts through SSH.
Strategy
Malware that brute forces SSH logins may act as a worm and use the compromised host to brute force other hosts. This can be identified by a large number of SSH connections to many different public IP addresses.
Triage and response
- Review the destination IP addresses. Determine if the host is expected to make outbound SSH connections.
- Review system authentication logs. Resources exhibiting this behavior are often compromised by SSH brute forcing.
- Review Related Signals and relevant logs for additional malicious activity.
- Repair the root cause of the compromise.
This detection is based on data from Cloud Network Monitoring.