anomalous_traffic_ssh

Explanation

This event is triggered by Netography's Fusion Portal when it detects a data transfer over TCP port 22 that exceeds an automatically determined baseline threshold. Auto Thresholding observes related network traffic to determine a baseline and then defines thresholds as a number of standard deviations from the typically observed traffic. This event specifically looks for data transfers over TCP port 22 that are multiple standard deviations greater than the learned baseline.

What to Look For

Anomalous traffic over SSH may be an indication that your network is compromised and attackers are stealing information by moving it (exfiltrating it) off your network. Attackers frequently exfiltrate data using SSH (Secure Shell) because it is a ubiquitous, cryptographic network protocol that allows file transfers to and from networked computer systems. Detections of anomalous traffic over SSH are worthy of investigation because they may be indicative of a ransomware attack or industrial espionage.

Investigate hosts that are the source of this sort of activity in order to make sure that it is authorized and expected, and the hosts have not been compromised. Ensure that hosts sending data over SSH are authorized to send data to systems outside your network in an approved file system location. Check network logs for additional information to ensure that sensitive information is secure.

Related MITRE ATT&CK Categories

Exfiltration - Enterprise