OpenCanary SSH Login Attempt Detection
Detects instances where an SSH service on an OpenCanary node has had a login attempt, indicating potential reconnaissance, privilege escalation, or lateral movement.
OpenCanary is a low-interaction honeypot designed to detect attackers on a network. This brief focuses on detecting SSH login attempts on OpenCanary nodes, which are designed to mimic real SSH servers but log any interaction. While the OpenCanary project itself has been around for several years, its integration with modern detection strategies makes it a valuable tool for defenders. An SSH login attempt against an OpenCanary instance signifies that an attacker is actively scanning or attempting to compromise systems within the network. This activity might be part of a broader campaign, including lateral movement, privilege escalation, or data exfiltration. The detection of such attempts allows for timely incident response and mitigation.
Attack Chain
- The attacker gains initial access to the network, possibly through phishing, exploiting a vulnerability, or compromised credentials.
- The attacker performs network scanning to identify potential targets, including the OpenCanary node masquerading as a legitimate SSH server.
- The attacker attempts to establish an SSH connection to the OpenCanary node, attempting to authenticate using various usernames and passwords.
- The OpenCanary service logs the failed SSH login attempt, recording the source IP address and attempted credentials.
- Security monitoring tools ingest the OpenCanary logs and trigger an alert based on the detected SSH login attempt.
- Security analysts investigate the alert, analyzing the source IP address and other relevant information to determine the scope and severity of the potential breach.
Impact
A successful SSH login attempt on a real server could lead to complete system compromise, data exfiltration, and disruption of services. While OpenCanary is designed to be a honeypot, detecting login attempts early allows for proactive measures to prevent attackers from reaching critical assets. Identifying the attacker’s source IP address and attempted usernames can provide valuable insights into their tactics and objectives, preventing damage.
Recommendation
- Deploy the Sigma rule “OpenCanary - SSH Login Attempt” to your SIEM to detect unauthorized SSH login attempts on OpenCanary nodes.
- Investigate and block any identified malicious source IP addresses from network access using firewall rules.
- Review OpenCanary configuration to ensure it is deployed in strategically valuable network segments (references: OpenCanary documentation).
- Correlate OpenCanary alerts with other security events to identify potential broader attack campaigns.
Detection coverage 2
OpenCanary - SSH Login Attempt
highDetects instances where an SSH service on an OpenCanary node has had a login attempt.
OpenCanary - Custom Logtype SSH Login Attempt
highDetects instances where an SSH service on an OpenCanary node has had a login attempt, using a custom logtype.
Detection queries are kept inside the platform. Get full rules →