heroui logo

Okta User Rejected MFA Push Request

Anvilogic Forge

View Source
Summary
The detection rule identifies events where an Okta user has rejected a multi-factor authentication (MFA) push request. This behavior could indicate potential unauthorized access attempts or suspicious activities from a threat actor. The detection leverages data sourced from Okta authentication logs where the event type indicates a denial of the MFA request. The rule aggregates relevant fields such as timestamps, user accounts involved, action details, and source IP addresses, allowing security teams to analyze patterns that may signify security incidents. The associated threat actors, LUCR-3 and Scattered Spider, are known for targeting multi-factor authentication systems, highlighting the importance of monitoring such events closely.
Categories
  • Identity Management
  • Cloud
  • Application
Data Sources
  • Application Log
ATT&CK Techniques
  • T1078
Created: 2024-02-09