Detection Library
highexperimentalLinuxOCIT1021.004
Linux Agent Invoking SSH Or SFTP
Detects AI agent runtimes spawning SSH or SFTP processes, which may indicate lateral movement, unauthorized remote code execution, or data exfiltration via encrypted channels.
Updated Jan 10, 2025 · OCI AI Security Team
agentic-aitool-misusesshsftplateral-movementlinuxociowasp-asi02
Problem Statement
SSH provides encrypted, authenticated access to remote systems and can be used for lateral movement, remote command execution, and data transfer. An AI agent spawning SSH processes is operating outside its intended scope and may be conducting network reconnaissance or exfiltration.
Sample Logs
{"timestamp":"2025-01-10T17:05:50Z","computer_name":"oci-worker-09","user":"agent_svc","image":"/usr/bin/ssh","command_line":"ssh -i /tmp/key root@10.0.5.22 'cat /etc/shadow'","parent_image":"/usr/bin/python3"}Required Fields
image
command_line
parent_image
user
computer_name
False Positives
- ·Deployment automation agents that use SSH to push configuration to managed hosts
- ·Backup agents that use SFTP to transfer files to archive storage
Tuning Guidance
Maintain an allowlist of approved SSH destinations and key paths. Alert on SSH with inline command execution (-c flag) or connections to previously unseen destinations.