T1563.001 SSH Hijacking

Adversaries may hijack a legitimate user's SSH session to move laterally within an environment. Secure Shell (SSH) is a standard means of remote access on Linux and macOS systems. It allows a user to connect to another system via an encrypted tunnel, commonly authenticating through a password, certificate or the use of an asymmetric encryption key pair.

In order to move laterally from a compromised host, adversaries may take advantage of trust relationships established with other systems via public key authentication in active SSH sessions by hijacking an existing connection to another system. This may occur through compromising the SSH agent itself or by having access to the agent's socket. If an adversary is able to obtain root access, then hijacking SSH sessions is likely trivial.(Citation: Slideshare Abusing SSH)(Citation: SSHjack Blackhat)(Citation: Clockwork SSH Agent Hijacking)(Citation: Breach Post-mortem SSH Hijack)

SSH Hijacking differs from use of SSH because it hijacks an existing SSH session rather than creating a new session using Valid Accounts.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.IR-01.05 Remote access protection Mitigates T1563.001 SSH Hijacking
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
References
    PR.AA-05.02 Privileged system access Mitigates T1563.001 SSH Hijacking
    Comments
    This diagnostic statement protects against SSH Hijacking through the use of privileged account management and the use of multi-factor authentication.
    References
      DE.CM-06.02 Third-party access monitoring Mitigates T1563.001 SSH Hijacking
      Comments
      This diagnostic statement protects against SSH Hijacking through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
      References
        PR.PS-01.06 Encryption management practices Mitigates T1563.001 SSH Hijacking
        Comments
        This diagnostic statement is associated with employing encryption methods to mitigate unauthorized access or theft of data that protect the confidentiality and integrity of data-at-rest, data-in-use, and data-in-transit. When it comes to cryptography and key management standards, for the SSH Hijacking technique, consider that SSH key pairs possess strong passwords and refrain from using key-store technologies such as ssh-agent unless they are properly protected.
        References
          PR.AA-05.03 Service accounts Mitigates T1563.001 SSH Hijacking
          Comments
          This diagnostic statement is for the implementation of security controls for service accounts (i.e., accounts used by systems to access other systems), such as granting service accounts only the minimum necessary permissions.
          References
            PR.AA-01.01 Identity and credential management Mitigates T1563.001 SSH Hijacking
            Comments
            This diagnostic statement protects against SSH Hijacking through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
            References
              PR.PS-01.05 Encryption standards Mitigates T1563.001 SSH Hijacking
              Comments
              This diagnostic statement is associated with employing strong encryption methods to mitigate unauthorized access or theft of data that protect the confidentiality and integrity of data-at-rest, data-in-use, and data-in-transit. When it comes to cryptography and key management standards, for the SSH Hijacking technique, consider that SSH key pairs possess strong passwords and refrain from using key-store technologies such as ssh-agent unless they are properly protected.
              References

                NIST 800-53 Mappings

                Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                CA-07 Continuous Monitoring mitigates T1563.001 SSH Hijacking
                CM-06 Configuration Settings mitigates T1563.001 SSH Hijacking
                CM-05 Access Restrictions for Change mitigates T1563.001 SSH Hijacking
                IA-05 Authenticator Management mitigates T1563.001 SSH Hijacking
                AC-17 Remote Access mitigates T1563.001 SSH Hijacking
                SC-12 Cryptographic Key Establishment and Management mitigates T1563.001 SSH Hijacking
                RA-05 Vulnerability Monitoring and Scanning mitigates T1563.001 SSH Hijacking
                CM-08 System Component Inventory mitigates T1563.001 SSH Hijacking
                SC-23 Session Authenticity mitigates T1563.001 SSH Hijacking
                CM-02 Baseline Configuration mitigates T1563.001 SSH Hijacking
                IA-02 Identification and Authentication (Organizational Users) mitigates T1563.001 SSH Hijacking
                CM-07 Least Functionality mitigates T1563.001 SSH Hijacking
                SI-04 System Monitoring mitigates T1563.001 SSH Hijacking
                AC-02 Account Management mitigates T1563.001 SSH Hijacking
                AC-03 Access Enforcement mitigates T1563.001 SSH Hijacking
                AC-05 Separation of Duties mitigates T1563.001 SSH Hijacking
                AC-06 Least Privilege mitigates T1563.001 SSH Hijacking

                VERIS Mappings

                Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                action.hacking.variety.Abuse of functionality Abuse of functionality. related-to T1563.001 SSH Hijacking
                action.hacking.variety.Hijack To assume control over and steal functionality for an illicit purpose (e.g. Hijacking phone number intercept SMS verification codes) related-to T1563.001 SSH Hijacking
                action.malware.vector.Network propagation Network propagation related-to T1563.001 SSH Hijacking

                Azure Mappings

                Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                azure_network_watcher_traffic_analytics Azure Network Watcher: Traffic Analytics technique_scores T1563.001 SSH Hijacking
                Comments
                This control can detect SSH hijacking.
                References