OpenCanary - RDP New Connection Attempt
Detects instances where an RDP service on an OpenCanary node has had a connection attempt.
Sigma rule (View on GitHub)
1title: OpenCanary - RDP New Connection Attempt
2id: 598290cf-5932-45cd-9123-be1e05ab4f2e
3status: experimental
4description: Detects instances where an RDP service on an OpenCanary node has had a connection attempt.
5references:
6 - https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
7 - https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
8author: Marco Pedrinazzi (@pedrinazziM)
9date: 2026-01-06
10tags:
11 - attack.initial-access
12 - attack.lateral-movement
13 - attack.persistence
14 - attack.t1133
15 - attack.t1021.001
16logsource:
17 category: application
18 product: opencanary
19detection:
20 selection:
21 logtype: 14001
22 condition: selection
23falsepositives:
24 - Unlikely
25level: high
References
Related rules
- User Added to Remote Desktop Users Group
- OpenCanary - SSH Login Attempt
- OpenCanary - SSH New Connection Attempt
- Suspicious File Created by ArcSOC.exe
- Potential Tampering With RDP Related Registry Keys Via Reg.EXE