Suspicious SQL backup activity

Last updated on:

About the rule

Rule Type

Advanced

Rule Description

This rule detects suspicious SQL backups which follows the pattern - sequence of logon failures followed by a successful logon to the network and SQL server, and then SQL database is backed up.

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "Failed logon" | timewindow 10m | groupby HOSTNAME | groupby USERNAME having COUNT >= 5 Action2: actionname = "Successful logon" AND USERNAME = Action1.USERNAME AND HOSTNAME = Action1.HOSTNAME Action3: actionname = "Successful logon" AND HOSTNAME = Action1.HOSTNAME Action4: actionname = "SQLServer Database Backup" AND USERNAME = Action3.USERNAME AND HOSTNAME = Action1.HOSTNAME sequence:Action1 followedby Action2 within 2m followedby Action3 within 30m followedby Action4 within 30m select Action1.timewindow.HOSTNAME,Action1.timewindow.MESSAGE,Action1.timewindow.USERNAME,Action1.timewindow.DOMAIN,Action1.timewindow.REMOTEHOST,Action1.timewindow.REMOTEIP,Action1.timewindow.LOGONTYPE,Action1.timewindow.PROCESSNAME,Action1.timewindow.FAILUREREASON,Action2.HOSTNAME,Action2.MESSAGE,Action2.USERNAME,Action2.DOMAIN,Action2.REMOTEHOST,Action2.REMOTEIP,Action2.LOGONTYPE,Action2.PROCESSNAME,Action2.CALLER,Action2.LOGON_PROCESS,Action2.MEMBERGROUPSID,Action2.SECURITYID,Action3.HOSTNAME,Action3.INSTANCENAME,Action3.USERNAME,Action3.DATABASENAME,Action3.SCHEMANAME,Action3.REMOTEHOST,Action3.OBJECTNAME,Action4.HOSTNAME,Action4.USERNAME,Action4.OBJECTNAME,Action4.INSTANCENAME,Action4.DATABASENAME,Action4.SCHEMANAME

Detection

Execution Mode

realtime

Log Sources

Miscellaneous