<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ssh — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ssh/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ssh/feed.xml" rel="self" type="application/rss+xml"/><item><title>Fortra GoAnywhere MFT SSH Key Brute-Force Vulnerability (CVE-2025-14362)</title><link>https://feed.craftedsignal.io/briefs/2026-04-goanywhere-bruteforce/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-goanywhere-bruteforce/</guid><description>Fortra's GoAnywhere MFT prior to 7.10.0 is vulnerable to brute-force attacks on SSH keys because the login limit is not enforced on the SFTP service when Web Users are configured to log in with an SSH Key.</description><content:encoded><![CDATA[<p>CVE-2025-14362 is a vulnerability affecting Fortra&rsquo;s GoAnywhere MFT servers prior to version 7.10.0. The vulnerability arises because the login limit is not enforced on the SFTP service when a Web User is configured to authenticate using an SSH key. This lack of enforcement allows attackers to conduct brute-force attacks against the SSH key, attempting to guess the key through repeated authentication attempts. Successful exploitation grants unauthorized access to the GoAnywhere MFT server, potentially leading to data breaches, system compromise, and other malicious activities. Defenders should prioritize patching vulnerable GoAnywhere MFT instances to version 7.10.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a GoAnywhere MFT server running a version prior to 7.10.0.</li>
<li>Attacker determines that the GoAnywhere MFT server allows Web Users to authenticate using SSH keys.</li>
<li>Attacker attempts to authenticate to the SFTP service using a series of generated SSH keys.</li>
<li>Due to the lack of login limit enforcement, the attacker can make unlimited authentication attempts without being locked out.</li>
<li>The attacker continues brute-forcing SSH keys until a valid key is guessed, or an exploitable weakness is found.</li>
<li>Upon successful authentication, the attacker gains unauthorized access to the GoAnywhere MFT server.</li>
<li>The attacker can then upload/download arbitrary files, execute commands, and potentially move laterally within the network.</li>
<li>The final objective is to exfiltrate sensitive data or establish a persistent foothold within the target environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-14362 can lead to unauthorized access to sensitive data managed by the GoAnywhere MFT server. This could include financial records, customer data, intellectual property, and other confidential information. The number of victims is dependent on the exposure of vulnerable GoAnywhere MFT servers. Sectors commonly using MFT solutions, such as finance, healthcare, and government, are at increased risk. The impact of a successful attack can range from data breaches and financial loss to reputational damage and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Fortra GoAnywhere MFT to version 7.10.0 or later to patch CVE-2025-14362 (reference: Overview).</li>
<li>Implement rate limiting on SSH authentication attempts at the network or host level to mitigate brute-force attacks, even after patching (reference: Attack Chain).</li>
<li>Monitor SFTP logs for excessive failed authentication attempts originating from the same source IP address using a Sigma rule similar to the one provided below (reference: Rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>goanywhere</category><category>mft</category><category>bruteforce</category><category>ssh</category></item><item><title>UniFi Play Improper Access Control Allows SSH Enablement</title><link>https://feed.craftedsignal.io/briefs/2026-04-unifi-play-ssh-enable/</link><pubDate>Mon, 13 Apr 2026 22:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-unifi-play-ssh-enable/</guid><description>CVE-2026-22564 is an improper access control vulnerability in UniFi Play PowerAmp and Audio Port devices that allows an attacker with network access to enable SSH and make unauthorized system changes.</description><content:encoded><![CDATA[<p>CVE-2026-22564 is a critical vulnerability affecting UniFi Play PowerAmp (version 1.0.35 and earlier) and UniFi Play Audio Port (version 1.0.24 and earlier) devices. This improper access control flaw allows a malicious actor, who has already gained access to the UniFi Play network, to enable SSH access on the affected devices. This unauthorized SSH access can then be leveraged to make arbitrary changes to the system configuration, potentially leading to full device compromise and further network exploitation. Successful exploitation requires network access to the UniFi Play devices. The vulnerability was reported by HackerOne and affects devices that have not been updated to the patched versions (PowerAmp 1.0.38 or Audio Port 1.1.9).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the UniFi Play network through unspecified means (e.g., compromised credentials, network misconfiguration, or physical access).</li>
<li>The attacker identifies vulnerable UniFi Play PowerAmp or Audio Port devices on the network running versions 1.0.35 or earlier (PowerAmp) and 1.0.24 or earlier (Audio Port).</li>
<li>The attacker exploits the improper access control vulnerability (CVE-2026-22564) by sending a crafted request to the vulnerable device.</li>
<li>This request bypasses access controls, enabling SSH access on the device.</li>
<li>The attacker uses an SSH client (e.g., OpenSSH) to connect to the device using the enabled SSH service, likely with default or easily guessable credentials (not specified in source, but common).</li>
<li>Once authenticated, the attacker executes privileged commands via the SSH shell.</li>
<li>The attacker modifies system configurations, installs malicious software, or exfiltrates sensitive data.</li>
<li>The attacker maintains persistent access to the compromised device and potentially uses it as a pivot point for further attacks within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22564 allows an attacker to gain unauthorized SSH access and make arbitrary changes to vulnerable UniFi Play devices. This can result in complete device compromise, allowing for data theft, installation of malware, and disruption of services. The vulnerability has a CVSS v3.1 score of 9.8 (Critical), indicating a high potential for severe impact. The scope of impact depends on the network configuration and the data handled by the compromised UniFi Play devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update UniFi Play PowerAmp devices to version 1.0.38 or later and UniFi Play Audio Port devices to version 1.1.9 or later to patch CVE-2026-22564.</li>
<li>Monitor network traffic for suspicious SSH connections to UniFi Play devices, especially from unexpected sources. Implement the provided Sigma rule targeting SSH login events.</li>
<li>Conduct a thorough review of the UniFi Play network to identify and remediate any potential initial access vectors that could be exploited to reach the vulnerable devices.</li>
<li>Review and harden default credentials on all network devices, including UniFi Play devices, to prevent attackers from easily gaining access after enabling SSH.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-22564</category><category>unifi-play</category><category>access-control</category><category>ssh</category></item><item><title>SSH Authorized Key File Modification Inside a Container</title><link>https://feed.craftedsignal.io/briefs/2026-04-ssh-authorized-keys-modification-inside-a-container/</link><pubDate>Thu, 02 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ssh-authorized-keys-modification-inside-a-container/</guid><description>The rule detects the creation or modification of an authorized_keys file inside a container, a technique used by adversaries to maintain persistence on a victim host by adding their own public key(s) to enable unauthorized SSH access for lateral movement or privilege escalation.</description><content:encoded><![CDATA[<p>This detection focuses on identifying malicious actors who modify SSH authorized_keys files inside containers to gain unauthorized access. SSH authorized keys are used for public key authentication, and modification of these files allows attackers to maintain persistence or move laterally within a containerized environment. The rule specifically looks for file creation and modification events of authorized_keys files within Linux-based containers. Introduced as part of the Defend for Containers integration in Elastic Stack version 9.3.0, this detection is crucial because unauthorized SSH access can lead to significant compromise within cloud environments and containerized workloads. Defenders need to be aware of unexpected SSH key modifications as indicators of compromise inside containerized environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, possibly through a software vulnerability or misconfiguration.</li>
<li>The attacker executes commands within the container to locate the SSH authorized_keys file (typically located at <code>/home/&lt;user&gt;/.ssh/authorized_keys</code> or <code>/root/.ssh/authorized_keys</code>).</li>
<li>The attacker modifies the authorized_keys file, adding their own SSH public key to the file using commands like <code>echo &quot;ssh-rsa AAAAB3Nz...&quot; &gt;&gt; /root/.ssh/authorized_keys</code>.</li>
<li>The attacker uses the newly added SSH key to authenticate and log into the container without needing a password.</li>
<li>The attacker uses the SSH session to execute further commands, potentially escalating privileges or moving laterally to other containers or systems.</li>
<li>The attacker maintains persistence by ensuring their SSH key remains in the authorized_keys file, allowing them to re-access the container at any time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the authorized_keys file enables persistent, unauthorized SSH access to the compromised container. This can lead to lateral movement within the container environment, privilege escalation, data exfiltration, or further attacks on other systems. The rule aims to detect these modifications early, preventing significant damage. While the number of specific victims isn&rsquo;t stated, a successful attack targeting containers can affect critical cloud infrastructure and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized modifications of SSH authorized_keys files within containers (rule: <code>SSH Authorized Key File Activity</code>).</li>
<li>Enable <code>Elastic Defend for Containers</code> integration (minimum version 9.3.0) to provide the necessary file event data for the Sigma rule to function correctly.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process and user context of the file modifications, as outlined in the rule&rsquo;s description (rule: <code>SSH Authorized Key File Activity</code>).</li>
<li>Implement stricter access controls and monitoring on SSH usage within containers to prevent similar incidents in the future, as recommended in the incident response section.</li>
<li>Create exceptions for known update processes or deployment scripts that regularly alter these files to reduce false positives, as suggested in the false positive analysis.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>container</category><category>persistence</category><category>lateral-movement</category><category>privilege-escalation</category><category>ssh</category></item><item><title>GitHub SSH Certificate Configuration Changed</title><link>https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</link><pubDate>Sat, 02 Nov 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-github-ssh-cert-config-changed/</guid><description>Attackers can modify SSH certificate configurations in GitHub organizations to gain unauthorized access, persist in the environment, escalate privileges, and operate stealthily.</description><content:encoded><![CDATA[<p>Attackers can abuse SSH certificate authorities in GitHub to gain unauthorized access to repositories. By creating or disabling SSH certificate requirements, attackers can bypass existing security controls and establish persistent access. This activity is logged in the GitHub audit logs, specifically when <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> actions are performed. Successful exploitation allows attackers to commit malicious code, steal sensitive data, or disrupt development workflows, impacting the integrity and confidentiality of the organization&rsquo;s resources. The GitHub audit log streaming feature must be enabled to detect this activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a GitHub organization, potentially through compromised credentials or social engineering.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates their privileges to an organizational role capable of managing SSH certificate authorities.</li>
<li><strong>SSH Certificate Authority Creation:</strong> The attacker creates a new SSH certificate authority within the GitHub organization (<code>ssh_certificate_authority.create</code>).</li>
<li><strong>Disable SSH Certificate Requirement:</strong> Alternatively, the attacker disables the requirement for members to use SSH certificates to access organization resources (<code>ssh_certificate_requirement.disable</code>). This action allows attackers to bypass security controls that enforce SSH certificate usage.</li>
<li><strong>Unauthorized Access:</strong> The attacker utilizes the newly created SSH certificate authority or the disabled requirement to access repositories without proper authorization.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally within the GitHub organization, accessing additional repositories and resources.</li>
<li><strong>Data Exfiltration/Malicious Code Injection:</strong> The attacker exfiltrates sensitive data or injects malicious code into the organization&rsquo;s repositories.</li>
<li><strong>Persistence:</strong> The attacker maintains persistent access by using the created SSH certificate authority or the disabled requirement for future unauthorized activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SSH certificate configurations in GitHub can lead to unauthorized code commits, data breaches, and supply chain attacks. This could result in financial losses, reputational damage, and legal repercussions for the affected organization. The number of affected repositories and the severity of the impact depend on the scope of the attacker&rsquo;s access and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the GitHub audit log streaming feature to capture SSH certificate configuration changes (logsource: github, service: audit, definition).</li>
<li>Deploy the provided Sigma rule to detect <code>ssh_certificate_authority.create</code> or <code>ssh_certificate_requirement.disable</code> events in the GitHub audit logs (rule: Github SSH Certificate Configuration Changed).</li>
<li>Regularly review GitHub audit logs for any unauthorized modifications to SSH certificate configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>github</category><category>ssh</category><category>certificate</category><category>initial-access</category><category>persistence</category><category>privilege-escalation</category><category>stealth</category><category>t1078.004</category></item><item><title>OpenCanary SSH Connection Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-05-opencanary-ssh-attempt/</link><pubDate>Wed, 08 May 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-opencanary-ssh-attempt/</guid><description>An SSH connection attempt to an OpenCanary node indicates a potential adversary probing for vulnerable services or attempting unauthorized access within a network.</description><content:encoded><![CDATA[<p>The OpenCanary SSH Connection Attempt alert signifies that an SSH service on a deployed OpenCanary node has received a connection attempt. OpenCanary is a low-interaction honeypot designed to detect reconnaissance and lateral movement activities within a network. This event, logged as logtype 4000 by default, suggests that an attacker is actively scanning for or attempting to exploit SSH services. This alert is crucial for defenders because OpenCanary nodes are deliberately placed to attract malicious activity, meaning any interaction is highly suspicious. The alert helps identify potential breaches early, allowing security teams to respond quickly. The configuration of services monitored by OpenCanary is detailed in the project&rsquo;s documentation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Reconnaissance: The attacker conducts network scanning using tools like Nmap or Masscan to identify open ports and services, including SSH (port 22).</li>
<li>Target Identification: The attacker identifies the OpenCanary node, mistaking it for a legitimate SSH server, due to its exposed SSH port.</li>
<li>Connection Attempt: The attacker attempts to establish an SSH connection to the OpenCanary node using a tool like <code>ssh</code> or a custom script.</li>
<li>Authentication Probe: The attacker might attempt to authenticate using default credentials, common usernames and passwords, or brute-force techniques.</li>
<li>Credential Compromise (Simulated): The OpenCanary node logs the failed or successful (simulated) login attempt, triggering the alert. OpenCanary may simulate a successful login for further interaction logging.</li>
<li>Lateral Movement (Attempted): If the attacker believes they have successfully authenticated, they may attempt lateral movement to other systems within the network.</li>
<li>Privilege Escalation (Attempted): The attacker could attempt to escalate privileges on the &ldquo;compromised&rdquo; system (OpenCanary) to gain further access.</li>
<li>Data Exfiltration/System Damage (Prevented): Because it&rsquo;s a honeypot, OpenCanary prevents actual data exfiltration or system damage but logs all attempted actions for analysis.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>An SSH connection attempt on an OpenCanary node, while not directly causing damage, indicates active reconnaissance or attempted unauthorized access within the network. The number of alerts generated can highlight the frequency of malicious scans targeting SSH services. Successful exploitation (simulated on the honeypot) could lead to lateral movement, privilege escalation, and data exfiltration if the attacker were to compromise a real system. This activity is valuable for understanding attacker behavior and improving overall security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect SSH connection attempts to OpenCanary nodes, focusing on <code>logtype: 4000</code>.</li>
<li>Review OpenCanary logs in conjunction with other security logs (firewall, endpoint) to correlate the SSH attempts with other suspicious activities.</li>
<li>Investigate the source IP addresses from which SSH connection attempts originate to identify potential threat actors.</li>
<li>Consult the OpenCanary documentation to ensure proper configuration of the SSH service and logging capabilities.</li>
<li>Use network segmentation to limit the potential impact of a successful breach, even if only simulated on the OpenCanary node.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>honeypot</category><category>ssh</category><category>reconnaissance</category></item><item><title>OpenCanary SSH Login Attempt Detection</title><link>https://feed.craftedsignal.io/briefs/2024-05-opencanary-ssh-login/</link><pubDate>Thu, 02 May 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-opencanary-ssh-login/</guid><description>Detects instances where an SSH service on an OpenCanary node has had a login attempt, indicating potential reconnaissance, privilege escalation, or lateral movement.</description><content:encoded><![CDATA[<p>OpenCanary is a low-interaction honeypot designed to detect attackers on a network. This brief focuses on detecting SSH login attempts on OpenCanary nodes, which are designed to mimic real SSH servers but log any interaction. While the OpenCanary project itself has been around for several years, its integration with modern detection strategies makes it a valuable tool for defenders. An SSH login attempt against an OpenCanary instance signifies that an attacker is actively scanning or attempting to compromise systems within the network. This activity might be part of a broader campaign, including lateral movement, privilege escalation, or data exfiltration. The detection of such attempts allows for timely incident response and mitigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the network, possibly through phishing, exploiting a vulnerability, or compromised credentials.</li>
<li>The attacker performs network scanning to identify potential targets, including the OpenCanary node masquerading as a legitimate SSH server.</li>
<li>The attacker attempts to establish an SSH connection to the OpenCanary node, attempting to authenticate using various usernames and passwords.</li>
<li>The OpenCanary service logs the failed SSH login attempt, recording the source IP address and attempted credentials.</li>
<li>Security monitoring tools ingest the OpenCanary logs and trigger an alert based on the detected SSH login attempt.</li>
<li>Security analysts investigate the alert, analyzing the source IP address and other relevant information to determine the scope and severity of the potential breach.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful SSH login attempt on a real server could lead to complete system compromise, data exfiltration, and disruption of services. While OpenCanary is designed to be a honeypot, detecting login attempts early allows for proactive measures to prevent attackers from reaching critical assets. Identifying the attacker&rsquo;s source IP address and attempted usernames can provide valuable insights into their tactics and objectives, preventing damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;OpenCanary - SSH Login Attempt&rdquo; to your SIEM to detect unauthorized SSH login attempts on OpenCanary nodes.</li>
<li>Investigate and block any identified malicious source IP addresses from network access using firewall rules.</li>
<li>Review OpenCanary configuration to ensure it is deployed in strategically valuable network segments (references: OpenCanary documentation).</li>
<li>Correlate OpenCanary alerts with other security events to identify potential broader attack campaigns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>honeypot</category><category>ssh</category><category>initial-access</category></item></channel></rss>