POLICY-OTHER --
POLICY-OTHER SSH inbound connection from non-standard port
This rule alerts on unusually low client ports connecting to SSH servers. While not necessarily malicious, it is highly unusual for a benign client to use a low numbered port (one within the list of "well-known" ports) to open a connection. For instance, the Mozi variant of the Mirai botnet has been observed connecting to SSH servers from unusually low ports.
This rule fires on inbound SSH connections from SSH clients using an unusually low TCP port.
Attacks/Scans seen in the wild
Known false positives, with the described conditions
This rule will detect all incoming SSH connections from SSH clients using a TCP port within the range of 1:1023.
Cisco Talos Intelligence Group
Rule Categories::Policy::Other
MITRE::ATT&CK Framework::Enterprise::Command and Control::Non-Standard Port
Rule Categories::Potentially Unwanted Applications::Application Detection
None
No information provided
None