An external attacker brute-forced SSH credentials for the analyst account on host Dominic. After gaining access, the attacker performed system reconnaissance, escalated privileges to root via unrestricted sudo rights, created a backdoor local account (lettsdefend), and deleted auth.log and audit.rules to destroy forensic evidence.
| Event | Timestamp |
|---|---|
| Brute-force activity (pre-login) | Prior to Jul 31, 2024, 03:10 PM |
| Successful SSH login (analyst) | Jul 31, 2024, 03:10 PM |
| audit.rules deleted (alert trigger) | Jul 31, 2024, 03:14 PM |
/var/log/auth.log, /etc/audit/rules.d/audit.rules87[.]249[.]134[.]136 — flagged malicious by AbuseIPDB (brute force / SSH category)analyst (full sudo rights)lettsdefendThe analyst account held unrestricted sudo rights, giving the attacker a direct path to root-level access without needing to exploit a vulnerability. This privilege level allowed the creation of a new local persistence account and the removal of both authentication and audit logs to hinder investigation.
Attacker command sequence (bash_history):
whoami
groups
cat /etc/group
find / -type f -name '*password*'
sudo useradd -m lettsdefend
sudo passwd lettsdefend
cd /var/log
cat auth.log | grep "87.249.134.136"
rm -r auth.log
cd /etc/audit/rules.d/
ls
cat audit.rules
rm -r audit.rules
| Technique ID | Tactic | Technique |
|---|---|---|
| T1110.001 | Credential Access | Brute Force - Password Guessing |
| T1078 | Initial Access | Valid Accounts |
| T1033 | Discovery | System Owner/User Discovery |
| T1069 | Discovery | Permission Groups Discovery |
| T1083 | Discovery | File and Directory Discovery |
| T1548.003 | Privilege Escalation | Abuse Elevation Control Mechanism - Sudo |
| T1136.001 | Persistence | Create Account - Local Account |
| T1070.002 | Defense Evasion | Indicator Removal - Clear Linux or Mac System Logs |
| Type | Value | Notes |
|---|---|---|
| IP Address | 87[.]249[.]134[.]136 | Attacker — AbuseIPDB: malicious, brute force/SSH |
| IP Address | 172[.]16[.]17[.]107 | Victim host — Dominic |
| Username | analyst | Compromised account |
| Username | lettsdefend | Backdoor account created by attacker |
| File | /var/log/auth[.]log | Deleted by attacker |
| File | /etc/audit/rules[.]d/audit[.]rules | Deleted by attacker (alert trigger) |