heroui logo

Brute Force By User

Panther Rules

View Source
Summary
The 'Brute Force By User' rule aims to detect instances where a user exceeds a specified threshold of failed login attempts within a defined time window. This rule is essential for identifying potential brute force attack attempts and unauthorized access to accounts. The configured threshold for failed login attempts is set to 20, with a deduplication period of 60 minutes, meaning if a user tries to log in unsuccessfully more than 20 times in an hour, this rule will trigger an alert. The rule monitors various log sources including AWS CloudTrail, Box Events, GSuite Reports, Okta System Logs, and OneLogin Events, allowing comprehensive coverage across multiple applications and services. Incoming login events are analyzed where a successful login would reset the count of failed attempts. The rule also cross-references logs across these platforms to identify patterns in login failures, hence providing a holistic view of user authentication attempts. Stakeholders can find reference materials on stabler brute force mitigation strategies at OWASP.
Categories
  • Identity Management
  • Cloud
  • Endpoint
  • Web
Data Sources
  • User Account
  • Network Traffic
  • Application Log
  • Cloud Service
ATT&CK Techniques
  • T1110
Created: 2025-01-15