SlideShare a Scribd company logo
5
Most read
6
Most read
9
Most read
SSH Brute Force Attack On AWS
Blockchain Instance
GROOTS AWS.
1. Continuously CPU utilization
increased by kswap0 process.
2. It breached 100% CPU
utilization.
3. Un-necessary SSH attempts get
increased.
Impact
One of the malware trying to penetrate the network of our customer who used
aws blockchain server.
That malware is known as “Shellbot”. The botnet uses brute force and SSH
exploit (exploit Shellshock Flaw and vulnerability) to achieve remote access to
the target systems, including blockchain server.
Summary
Technical Observation
In next slide attached brute attack diagram, it shows SSH brute force attack.
The SSH access or auth log shows request come from different IP’s and user’s.
Using this trick, brute force is able to bypass lockout login mechanism such as
Fail2ban. Once instance is fully compromised, attacker installed hacking suite.
All the malicious logic is managed by bash or perl scripts.
SSH Brute Attack - SSH Observation
● Check SSH auth login log file -
cat /var/log/auth.log | tail
cat /var/log/auth.log | egrep -i fail
Malicious directory
SSH Brute Attack - SSH Observation
● Check SSH auth login log file -
$ cat /var/log/auth.log | tail
$ cat /var/log/auth.log | egrep -i fail
● Get the total SSH user login attempts.
$ cat /var/log/auth.log | egrep -i fail | egrep -i “invalid user” | wc -l
● Get the SSH user login name list & count.
$ cat /var/log/auth.log | egrep -i fail | egrep -i “invalid user” | cut -d ‘ ‘ -f11 | sort | uniq -c
| sort -nr | head
● Find out un-necessary cron jobs of all system users & remove it.
$ sed 's/^([^:]*):.*$/crontab -u 1 -l 2>&1/' /etc/passwd | grep -v "no crontab for" | sh
Expected output -
1 1 */2 * * /var/lib/postgresql/.configrc/a/upd>/dev/null 2>&1
@reboot /var/lib/postgresql/.configrc/a/upd>/dev/null 2>&1
5 8 * * 0 /var/lib/postgresql/.configrc/b/sync>/dev/null 2>&1
@reboot /var/lib/postgresql/.configrc/b/sync>/dev/null 2>&1
0 0 */3 * * /tmp/.X25-unix/.rsync/c/aptitude>/dev/null 2>&1
SSH Brute Attack - Observation & Action
● Navigate to the directories which are observed in unrelated cron jobs and remove unrelated
executable files.
● Verify the valid outbound connections established from the server to other hosts.
$netstat -tupn | grep -E "*ESTABLISHED"
Expected output:
172.31.44.75:45280 212.227.140.133:22 ESTABLISHED 18631/tsm
● In case the connections are unrelated and suspicious, check the details using its PID and kill
such suspected processes.
$ lsof 18631
$ kill 18631
SSH Brute Attack - Observation & Action
Thank you !!!
Groots Software Technologies.
Would you recommend this solution?
Write your review here.

More Related Content

PPTX
Cyber Security Fundamentals
PDF
Diagrama y algoritmo de mantenimiento preventivo de hardware
PPTX
Basic computer fundamentals
PPTX
Manual ensamble y desensamble
PPTX
malware
DOCX
Hardware-para-sexto-de-primaria (1).docx
PDF
Plan de mantenimiento preventivo de Software y Hardware
PDF
ÁREAS RESERVADAS A FAVOR DE YPFB-2018
Cyber Security Fundamentals
Diagrama y algoritmo de mantenimiento preventivo de hardware
Basic computer fundamentals
Manual ensamble y desensamble
malware
Hardware-para-sexto-de-primaria (1).docx
Plan de mantenimiento preventivo de Software y Hardware
ÁREAS RESERVADAS A FAVOR DE YPFB-2018

What's hot (12)

PDF
Cyber Security: Why your business needs protection & prevention measures
DOCX
Disposiciones antes de entrar a la sala de computo
ODT
Seguridad informatica
PPT
Mca i-fundamental of computer-u-1-computer hardware system
PPT
¿Qué es el software?
PPTX
Cyber security
PPTX
Mantenimiento de la pc
DOCX
Ficha técnica de equipos de computo full
PPT
Spyware
DOCX
Defensa de Red - Seguridad Informática
PPTX
Normas de higiene y seguridad de un centro de computo
PPTX
Interrupciones
Cyber Security: Why your business needs protection & prevention measures
Disposiciones antes de entrar a la sala de computo
Seguridad informatica
Mca i-fundamental of computer-u-1-computer hardware system
¿Qué es el software?
Cyber security
Mantenimiento de la pc
Ficha técnica de equipos de computo full
Spyware
Defensa de Red - Seguridad Informática
Normas de higiene y seguridad de un centro de computo
Interrupciones
Ad

Similar to SSH Brute Force Attack (20)

PDF
Linux Hardening - Made Easy
PPTX
PDF
Linux security quick reference guide
PDF
SSH.pdf
PDF
SSH: Seguranca no Acesso Remoto
PPT
Presentation nix
PPT
Presentation nix
PDF
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
PPTX
DevSecCon Singapore 2018 - System call auditing made effective with machine l...
DOCX
Cent os 5 ssh
PDF
Hack the box open admin writeup
PPTX
Applying ML for Log Analysis
PPTX
Server hardening
PDF
An introduction to SSH
PDF
Fail2ban - the system security for green hand -on linux os
PDF
CentOS Linux Server Hardening
PDF
BlueHat v18 || The matrix has you - protecting linux using deception
TXT
Linuxserver harden
PPT
China.z / Trojan.XorDDOS - Analysis of a hack
PPTX
Security Walls in Linux Environment: Practice, Experience, and Results
Linux Hardening - Made Easy
Linux security quick reference guide
SSH.pdf
SSH: Seguranca no Acesso Remoto
Presentation nix
Presentation nix
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
DevSecCon Singapore 2018 - System call auditing made effective with machine l...
Cent os 5 ssh
Hack the box open admin writeup
Applying ML for Log Analysis
Server hardening
An introduction to SSH
Fail2ban - the system security for green hand -on linux os
CentOS Linux Server Hardening
BlueHat v18 || The matrix has you - protecting linux using deception
Linuxserver harden
China.z / Trojan.XorDDOS - Analysis of a hack
Security Walls in Linux Environment: Practice, Experience, and Results
Ad

Recently uploaded (20)

PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
Cost to Outsource Software Development in 2025
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PDF
AutoCAD Professional Crack 2025 With License Key
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
Download FL Studio Crack Latest version 2025 ?
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Why Generative AI is the Future of Content, Code & Creativity?
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
Weekly report ppt - harsh dattuprasad patel.pptx
Reimagine Home Health with the Power of Agentic AI​
Advanced SystemCare Ultimate Crack + Portable (2025)
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Patient Appointment Booking in Odoo with online payment
Cost to Outsource Software Development in 2025
Monitoring Stack: Grafana, Loki & Promtail
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
iTop VPN Crack Latest Version Full Key 2025
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
AutoCAD Professional Crack 2025 With License Key
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Download FL Studio Crack Latest version 2025 ?
Oracle Fusion HCM Cloud Demo for Beginners
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx

SSH Brute Force Attack

  • 1. SSH Brute Force Attack On AWS Blockchain Instance GROOTS AWS.
  • 2. 1. Continuously CPU utilization increased by kswap0 process. 2. It breached 100% CPU utilization. 3. Un-necessary SSH attempts get increased. Impact
  • 3. One of the malware trying to penetrate the network of our customer who used aws blockchain server. That malware is known as “Shellbot”. The botnet uses brute force and SSH exploit (exploit Shellshock Flaw and vulnerability) to achieve remote access to the target systems, including blockchain server. Summary
  • 4. Technical Observation In next slide attached brute attack diagram, it shows SSH brute force attack. The SSH access or auth log shows request come from different IP’s and user’s. Using this trick, brute force is able to bypass lockout login mechanism such as Fail2ban. Once instance is fully compromised, attacker installed hacking suite. All the malicious logic is managed by bash or perl scripts.
  • 5. SSH Brute Attack - SSH Observation ● Check SSH auth login log file - cat /var/log/auth.log | tail cat /var/log/auth.log | egrep -i fail
  • 7. SSH Brute Attack - SSH Observation ● Check SSH auth login log file - $ cat /var/log/auth.log | tail $ cat /var/log/auth.log | egrep -i fail ● Get the total SSH user login attempts. $ cat /var/log/auth.log | egrep -i fail | egrep -i “invalid user” | wc -l ● Get the SSH user login name list & count. $ cat /var/log/auth.log | egrep -i fail | egrep -i “invalid user” | cut -d ‘ ‘ -f11 | sort | uniq -c | sort -nr | head
  • 8. ● Find out un-necessary cron jobs of all system users & remove it. $ sed 's/^([^:]*):.*$/crontab -u 1 -l 2>&1/' /etc/passwd | grep -v "no crontab for" | sh Expected output - 1 1 */2 * * /var/lib/postgresql/.configrc/a/upd>/dev/null 2>&1 @reboot /var/lib/postgresql/.configrc/a/upd>/dev/null 2>&1 5 8 * * 0 /var/lib/postgresql/.configrc/b/sync>/dev/null 2>&1 @reboot /var/lib/postgresql/.configrc/b/sync>/dev/null 2>&1 0 0 */3 * * /tmp/.X25-unix/.rsync/c/aptitude>/dev/null 2>&1 SSH Brute Attack - Observation & Action
  • 9. ● Navigate to the directories which are observed in unrelated cron jobs and remove unrelated executable files. ● Verify the valid outbound connections established from the server to other hosts. $netstat -tupn | grep -E "*ESTABLISHED" Expected output: 172.31.44.75:45280 212.227.140.133:22 ESTABLISHED 18631/tsm ● In case the connections are unrelated and suspicious, check the details using its PID and kill such suspected processes. $ lsof 18631 $ kill 18631 SSH Brute Attack - Observation & Action
  • 10. Thank you !!! Groots Software Technologies. Would you recommend this solution? Write your review here.