
Multiple Okta User Authentication Events with Same Device Token Hash
Elastic Detection Rules
View SourceSummary
The rule detects an abnormal increase in authentication events from multiple Okta users utilizing the same device token hash within a short time frame, suggesting potential credential stuffing or password spraying attacks. To investigate, analysts should leverage specific fields such as `okta.actor.alternate_id` to pinpoint the users involved, analyze the device used for these authentication attempts, and determine the outcome of the attempts. False positives may arise from legitimate users sharing devices or systems. The rule outlines various investigation and response steps to discern between legitimate multi-user scenarios and actual unauthorized access attempts. The risk score is set to low, reflecting the nature of the detection, but emphasizes the need for proper monitoring due to potential security threats.
Categories
- Identity Management
- Cloud
- Web
Data Sources
- User Account
- Cloud Service
- Application Log
ATT&CK Techniques
- T1110
- T1110.003
- T1110.004
Created: 2024-06-17