Skip to content

Improve description and false positives for Linux security tool disablement detection#5853

Open
amittrap wants to merge 4 commits intoSigmaHQ:masterfrom
amittrap:master
Open

Improve description and false positives for Linux security tool disablement detection#5853
amittrap wants to merge 4 commits intoSigmaHQ:masterfrom
amittrap:master

Conversation

@amittrap
Copy link

@amittrap amittrap commented Feb 3, 2026

I’ve added an additional Sigma rule to detect SSH brute-force authentication
attempts via Linux syslog as part of this branch. If preferred, I can split
this into a separate pull request for clarity.

…lement detection

Enhances the description to clarify the detection of attempts to disable Linux security services and adds more context on potential false positives.
@github-actions github-actions bot added Rules Review Needed The PR requires review Linux Pull request add/update linux related rules labels Feb 3, 2026
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.004/T1562.004.md
author: Ömer Günal, Alejandro Ortuno, oscd.community
date: 2020-06-17
modified: 2022-11-26
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Modified date needs to be updated

- 'Failed password'
- 'Invalid user'
- 'authentication failure'
- 'PAM authentication failure'
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

PAM is not linked to SSH so PAM authentication failure could mean many tihngs.
Also the other strings you are using are generic since you are reading this from syslog. So you cannot call this an SSH bruteforce.

I suggest you update the metadata to reflect that auth failures are in place or something similar and worth investigating.

- Unknown
- Rare SSH client compatibility issues
- Corrupted or malformed SSH traffic due to network issues
- Security testing, vulnerability scanning, or fuzzing activity
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These are not FPs but potentially accepted TPs. So we do not list them

Suggested change
- Security testing, vulnerability scanning, or fuzzing activity

Comment on lines +4 to +8
description: >
Detects suspicious or fatal OpenSSH daemon error messages that may indicate
exploitation attempts, malformed authentication traffic, or protocol abuse
targeting the SSH service. Such errors are commonly observed during
vulnerability scanning or active exploitation.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
description: >
Detects suspicious or fatal OpenSSH daemon error messages that may indicate
exploitation attempts, malformed authentication traffic, or protocol abuse
targeting the SSH service. Such errors are commonly observed during
vulnerability scanning or active exploitation.
description: |
Detects suspicious or fatal OpenSSH daemon error messages that may indicate exploitation attempts, malformed authentication traffic, or protocol abuse targeting the SSH service.
Such errors could be a sign of vulnerability scanning or active exploitation attempts.

Comment on lines +7 to +11
description: >
Detects attempts to stop or disable common Linux security services such as
firewalls and endpoint protection agents via system log messages. Adversaries
may disable security tooling to evade detection and maintain persistence.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
description: >
Detects attempts to stop or disable common Linux security services such as
firewalls and endpoint protection agents via system log messages. Adversaries
may disable security tooling to evade detection and maintain persistence.
description: |
Detects attempts to stop or disable common Linux security services such as firewalls and endpoint protection agents via system log messages.
Adversaries may disable security tooling to evade detection and maintain persistence.

within system log messages. Such activity is commonly associated
with credential stuffing or password guessing attacks.
references:
- https://attack.mitre.org/techniques/T1110/
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No need for MITRE links since we already have tags.

Suggested change
- https://attack.mitre.org/techniques/T1110/

@nasbench nasbench added the Author Input Required changes the require information from original author of the rules label Feb 16, 2026
@nasbench nasbench added this to the Sigma-February-Release milestone Feb 16, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Author Input Required changes the require information from original author of the rules Linux Pull request add/update linux related rules Review Needed The PR requires review Rules

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants