OpenCanary - Telnet Login Attempt
Detects instances where a Telnet service on an OpenCanary node has had a login attempt.
Sigma rule (View on GitHub)
1title: OpenCanary - Telnet Login Attempt
2id: 512cff7a-683a-43ad-afe0-dd398e872f36
3status: experimental
4description: Detects instances where a Telnet service on an OpenCanary node has had a login attempt.
5references:
6 - https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
7 - https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
8author: Security Onion Solutions
9date: 2024-03-08
10tags:
11 - attack.initial-access
12 - attack.command-and-control
13 - attack.t1133
14 - attack.t1078
15logsource:
16 category: application
17 product: opencanary
18detection:
19 selection:
20 logtype: 6001
21 condition: selection
22falsepositives:
23 - Unlikely
24level: high
References
Related rules
- External Remote RDP Logon from Public IP
- External Remote SMB Logon from Public IP
- Failed Logon From Public IP
- OpenCanary - SSH Login Attempt
- OpenCanary - SSH New Connection Attempt