heroui logo

OneLogin Password Access

Panther Rules

View Source
Summary
The detection rule 'OneLogin.PasswordAccess' is designed to identify unauthorized accesses to user passwords in OneLogin. Specifically, it triggers when a user accesses another user's application password, which typically indicates potential credential harvesting or misuse. This could pose a serious security risk, depending on the context of the access. The rule utilizes logs generated by OneLogin events, focusing on a specific event type (240) that indicates password access actions. The rule includes tests to distinguish between legitimate password accesses (e.g., a user accessing their own password) and unauthorized attempts (e.g., a user accessing someone else's password). The output of the detection is categorized under MITRE ATT&CK framework activity T1552, which relates to the improper access of credentials.
Categories
  • Identity Management
  • Cloud
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1552
Created: 2022-09-02