• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Unconventional SSH Data Transfer

Risk Factors

SSH is a common target for attackers because it is often enabled by default and provides remote access to other devices. If an attacker gains access to a poorly-secured SSH server, they can easily transfer data. Unusual data transfers can be associated with risky activity such as sharing malicious files between compromised devices or data staging. Data staging is the process of collecting and preparing data for exfiltration. Depending on the sensitivity of the transferred files, the impact can be devastating if important, proprietary, or customer data is leaked.

The system might change the risk score for this detection.

Kill Chain

Actions on Objective

Risk Score

60

Next in Actions on Objective: Unconventional Telnet Data Transfer

Attack Background

N/A

Mitigation Options

Implement strict rules for outbound traffic on devices that contain valuable data

Track suspicious activity by implementing strict audit controls on important documents

Disable SSH on devices unless required

Only allow incoming SSH connections from trusted devices such as administrator workstations

Implement a strong password policy

Do not reuse passwords

Rely on public key authentication, which is more resilient to brute force attacks than password authentication, by disabling PasswordAuthentication in sshd_config

MITRE ATT&CK ID

What else can RevealX do for you?