SSH interesting hostname login notice from Zeek

This rule is part of a beta feature. To learn more, contact Support.
zeek

Classification:

attack

Set up the zeek integration.

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect the SSH interesting hostname login notice.

Strategy

This rule monitors Zeek logs for the notice SSH::Interesting_Hostname_Login. The notice is generated if a login originates or responds with a host with a reverse hostname that looks suspicious.

Triage and response

  1. Identify the owners of the host that has been accessed.
  2. Work with the team to understand if this authentication was expected/legitimate.
    1. If it is determined that the activity is malicious:
    • Block the IP address, if it aligns with organization incident response processes.
    • Begin your organization’s incident response process and investigate.