Chat on WhatsApp
HomeAbout SOC ProjectsPortfolio ServicesAcademy CertificationsBlog Contact →
← All Projects CRITICAL ● RESOLVED
Case Study #001 — SIEM · Threat Detection

SSH Brute Force Attack Detection

Analyst: O.T. Nathaniel, AMICDFA
Date: February 2026
Environment: Linux Ubuntu 22.04 (Lab)
MITRE: T1110.001 — Brute Force: Password Guessing

📋 Scenario

During a routine SIEM monitoring shift, the SOC dashboard flagged 847 failed SSH authentication attempts against a Linux server (192.168.10.50) from a single external IP over a 4-minute window. The correlation rule threshold — more than 10 failed attempts per 60 seconds — was exceeded.

🎯 Objective

Determine whether the failures represent a genuine brute force attack. Identify attacker IP, attack pattern, assess credential compromise, and produce containment + detection improvements.

🧰 Tools Used

Splunk SIEMSysmon Linux auth.logSigma Rules VirusTotalAbuseIPDB MITRE ATT&CK

🔬 Investigation Process

01

Alert Triage

SIEM alert "SSH_BRUTE_FORCE_THRESHOLD_EXCEEDED" — 847 failed attempts from 45.142.212.100 in 4 minutes. Classified True Positive based on volume and pattern.

02

Log Analysis

Splunk query: index=linux sourcetype=syslog "Failed password" | stats count by src_ip, user. Identified systematic username enumeration — root, admin, ubuntu, pi. Pattern consistent with Hydra/Medusa (avg 287ms between attempts).

03

IP Reputation

AbuseIPDB confidence score 98% — 312 reports in 30 days for SSH scanning. Whois: AS198605 — Atlex.ru, Russia. VPS provider associated with attack infrastructure.

04

Successful Login Check

Cross-referenced auth.log for "Accepted" events. Result: Zero successful authentications. No lateral movement detected in subsequent Sysmon logs.

05

Containment

Firewall block: iptables -A INPUT -s 45.142.212.100 -p tcp --dport 22 -j DROP. Recommended: SSH key-only auth, fail2ban, non-standard SSH port.

🚨 Indicators of Compromise

Attacker IP
45.142.212.100
Target
192.168.10.50:22
Volume
847 attempts / 4 mins
Tool Fingerprint
Hydra (287ms avg interval)
Usernames
root, admin, ubuntu, pi, test
ASN
AS198605 — Atlex.ru, Russia

🛡️ Sigma Rule — Detection

title: SSH Brute Force Detection status: production logsource: product: linux service: auth detection: selection: content: 'Failed password' timeframe: 60s condition: selection | count() > 10 by src_ip level: high tags: - attack.credential_access - attack.t1110.001

✅ Conclusion

Finding: Confirmed automated SSH brute force from threat actor infrastructure. No credentials compromised. Attack contained within 6 minutes of initial alert triage.