heroui logo

Potential Okta MFA Bombing via Push Notifications

Elastic Detection Rules

View Source
Summary
The rule, authored by Elastic, focuses on detecting potential abuse of the Multi-Factor Authentication (MFA) mechanism within Okta by monitoring the sequence of login requests. An adversary may attempt to gain unauthorized access by repeatedly sending MFA notifications until the legitimate user unwittingly approves a login. The rule specifically identifies scenarios where a user denies two consecutive MFA push notifications followed by a successful authentication event within a 10-minute window. This sequence could indicate that an attacker is trying to bypass the MFA protections in place. The EQL query employs a sequence detection methodology where it looks for the specified denial events associated with the unique actor ID, followed by a successful login attempt from the same actor. The rule includes guidance on investigation steps, false positive analysis, and response actions in the event unauthorized access is confirmed, emphasizing the critical nature of observing user behaviors and authentication patterns.
Categories
  • Identity Management
  • Cloud
  • Endpoint
Data Sources
  • User Account
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1621
Created: 2023-11-18