Rule Category

APP-DETECT -- Snort attempted to take unique patterns of traffic and match them to a known application pattern, to confirm whether traffic should be allowed or stopped. (For example, a Get request is usually an HTTP/web application exchange, perhaps Facebook Messenger or other instant messenger, etc.).

Alert Message

APP-DETECT FTP 530 Login failed response

Rule Explanation

This event is generated when network traffic that indicates a failed FTP login attempt has occurred. Impact: Possible policy violation. Details: This event indicates that indicates a failed FTP login attempt has occurred. Ease of Attack: Simple.

What To Look For

This rule fires when a failed FTP login response message with a code of 530 is detected.

Known Usage

Attacks/Scans seen in the wild

False Positives

Known false positives, with the described conditions

This will alert on people not correctly entering their passwords, however, if the alerts show a large number of failed attempts from a certain IP it could indicate an attempt at brute forcing FTP passwords.

Contributors

Cisco Talos

Rule Groups

No rule groups

CVE

None

Additional Links

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None

MITRE ATT&CK Framework

Tactic: Credential Access

Technique: Brute Force

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org