Skip to content

Conversation

@LB89-code
Copy link

Summary of the Pull Request

This PR adds a new Sigma rule for detecting repeated SSH authentication failures on Linux systems.
The rule identifies potential brute-force activity based on multiple failed login attempts from the same source.

Changelog

new: Add SSH Multiple Authentication Failures detection rule

Example Log Event

{
"timestamp": "2025-12-03T10:15:22Z",
"host": "ubuntu-server",
"process": "sshd",
"event": "Failed password",
"source_ip": "192.168.1.50",
"username": "root"
}

Fixed Issues

N/A – new rule, no fixes included.

SigmaHQ Rule Creation Conventions

This rule follows SigmaHQ conventions, uses valid ATT&CK tags, modern condition syntax, and a UUID-based rule identifier.

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions bot added Rules Review Needed The PR requires review Linux Pull request add/update linux related rules labels Dec 4, 2025
@nasbench
Copy link
Member

nasbench commented Dec 4, 2025

Please keep your rule up to standard by reading the conventions linked in the PR summary as well as the specs. Or else this PR will be closed

@nasbench nasbench marked this pull request as draft December 4, 2025 16:24
@LB89-code
Copy link
Author

Thanks for the review! I've updated the rule according to the Sigma conventions. Please let me know if you’d like any further adjustments.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Linux Pull request add/update linux related rules Review Needed The PR requires review Rules

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants