
Summary
This detection rule is designed to identify potentially malicious activity associated with the unenrollment of Multi-Factor Authentication (MFA) devices in Auth0. Threat actors often target MFA settings to reduce the integrity of account security, especially after compromising an account. The rule works by monitoring authentication logs and looking specifically for the event of an MFA device being unenrolled. The logic utilizes the `get_authentication_data_auth0` command to check for events flagged as 'gd_unenroll', or messages indicating that an authenticator device has been removed. The resulting logs are filtered based on the event type and are structured to provide insights such as the timestamp, user, geographic location, and source IP address of the event. This contextual information is critical for identifying possible account breaches and understanding the landscape surrounding the threat. Security teams can leverage this detection to respond quickly to suspicious activities that may indicate an attempt to bypass MFA protections.
Categories
- Identity Management
- Cloud
- Web
- Application
Data Sources
- User Account
- Application Log
- Cloud Service
ATT&CK Techniques
- T1556.006
Created: 2025-02-28