heroui logo

Okta Multiple OS Names Detected for a Single DT Hash

Elastic Detection Rules

View Source
Summary
The detection rule identifies instances when a single Okta device token hash (dt_hash) is linked to multiple operating system types. Such a scenario is significantly anomalous since device tokens are specifically tied to the device and its operating system. The alert indicates a potential compromise where an attacker has stolen a device token and is attempting to impersonate a legitimate user from different operating systems. To analyze the alert, investigators are advised to review the dt_hash, user accounts involved, the originating IP addresses, different operating systems reported, authentication event actions, and look for suspicious patterns over time. Special attention should be given to managing false positives, as the operating system may be tagged as null for unmanaged devices. Remediation steps include checking for account compromises, enforcing credentials reset, and active session revocation.
Categories
  • Identity Management
Data Sources
  • User Account
  • Application Log
  • Process
ATT&CK Techniques
  • T1539
Created: 2025-10-22