heroui logo

Push Security Phishable MFA Method

Panther Rules

View Source
Summary
The "Push Security Phishable MFA Method" rule is designed to monitor and detect accounts using multi-factor authentication (MFA) methods that are considered phishable. The rule identifies accounts associated with external applications like Dropbox and Google Workspace that utilize SMS or email-based OTP (One-Time Password) methods for MFA but have not registered for MFA. This situation can pose a security risk since these methods can be susceptible to phishing attacks. There are multiple test scenarios defined: checking for accounts in Dropbox and Google Workspace that are registered for MFA methods but haven't completed the registration process, and ensuring that accounts not using MFA are detected accordingly. The rule examines logs from "PushSecurity.Entities" to trigger alerts based on these conditions and is set with a severity level of "Info" and a deduplication period of 60 minutes. If any account meets the specified conditions, an alert is generated to raise awareness of potentially vulnerable accounts.
Categories
  • Cloud
  • Identity Management
  • Web
Data Sources
  • User Account
  • Application Log
Created: 2024-06-27