
Summary
This rule is designed to detect instances of multiple consecutive failed login attempts followed by a successful login from the same source IP address, a common tactic used by attackers to brute force user credentials. Specifically, it tracks network logon types and filters out certain noise from misconfiguration, service accounts, and known system accounts. The rule employs EQL (Event Query Language) to identify sequences where multiple authentication failures are recorded for the same user, followed by a successful authentication event. It integrates various investigative methods, leveraging Osquery to dig deeper into DNS cache and service configurations associated with the source IP during suspicious activities. The rule's context helps analysts prioritize responses based on the criticality of affected accounts, assess access controls, and determine whether network settings need modification to prevent similar incidents.
Categories
- Windows
- Endpoint
Data Sources
- Logon Session
- Network Traffic
- Application Log
- Process
- User Account
ATT&CK Techniques
- T1110
- T1110.001
- T1110.003
Created: 2020-08-29