heroui logo

Okta: MFA Response without Verify App

Anvilogic Forge

View Source
Summary
This detection rule is designed to identify instances when a user responds to a Multi-Factor Authentication (MFA) challenge via channels other than the Okta Verify application, indicating a potential security breach. The rule addresses a specific threat that emerged when a Chief Technology Officer's (CTO) Okta account was compromised. The attacker, employing social engineering tactics, misled the help desk into registering their device. Subsequently, MFA challenges were sent via SMS to the compromised account. This behavior is indicative of unauthorized access attempts that may exploit standard MFA processes. The rule checks for relevant events in the Okta logs, specifically looking for MFA responses via SMS, email, or voice call while excluding responses through the Okta Verify app. By scrutinizing event types and actions, the rule ensures that only successful responses that deviate from the expected MFA protocol are flagged. This proactive detection is crucial for preventing account hijacking and maintaining secure authentication practices within organizations.
Categories
  • Identity Management
  • Cloud
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1078
  • T1556.006
  • T1098.005
Created: 2024-02-09