
Deprecated - Potential Password Spraying of Microsoft 365 User Accounts
Elastic Detection Rules
View SourceSummary
This rule detects potential password spraying attacks targeting Microsoft 365 user accounts by identifying a high number of failed authentication attempts (25 or more) from a single IP address within a 30-minute window. Password spraying is a technique where an attacker attempts to log into a large number of accounts using a small number of commonly used passwords. In this case, specific Microsoft 365 services, including Exchange and Azure Active Directory, are monitored for such activities. The rule is marked as deprecated, with a recommendation to refer to a newer detection rule for similar threats. False positives can occur due to automated processes attempting to authenticate with expired credentials, which can lead to numerous failed login attempts and trigger the rule unintentionally. The rule utilizes the KQL (Kibana Query Language) to filter relevant events from the specified indices, focusing on user login failures.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1110
Created: 2020-12-01