OpenCanary - MSSQL Login Attempt Via Windows Authentication
Detects instances where an MSSQL service on an OpenCanary node has had a login attempt using Windows Authentication.
Sigma rule (View on GitHub)
1title: OpenCanary - MSSQL Login Attempt Via Windows Authentication
2id: 6e78f90f-0043-4a01-ac41-f97681613a66
3status: experimental
4description: |
5 Detects instances where an MSSQL service on an OpenCanary node has had a login attempt using Windows Authentication.
6references:
7 - https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
8 - https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
9author: Security Onion Solutions
10date: 2024-03-08
11tags:
12 - attack.credential-access
13 - attack.collection
14 - attack.t1003
15 - attack.t1213
16logsource:
17 category: application
18 product: opencanary
19detection:
20 selection:
21 logtype: 9002
22 condition: selection
23falsepositives:
24 - Unlikely
25level: high
References
Related rules
- OpenCanary - MSSQL Login Attempt Via SQLAuth
- OpenCanary - MySQL Login Attempt
- OpenCanary - REDIS Action Command Attempt
- Access To Crypto Currency Wallets By Uncommon Applications
- Automated Collection Command Prompt