
Summary
This detection rule is focused on identifying potential account takeover attempts through excessive login failures for a single account in an Auth0 environment. It works by monitoring authentication logs to detect when an IP address is blocked due to surpassing the maximum attempts allowed for logging into a particular user account. Such behavior typically indicates that an attacker may be employing brute force strategies, either by guessing passwords or using stolen credentials to infiltrate the account. The rule utilizes specific queries to fetch authentication data and filters for events indicating an IP block due to failed login attempts. This allows security teams to react promptly to potential threats targeting user accounts.
Categories
- Identity Management
- Cloud
- Web
Data Sources
- User Account
- Application Log
- Network Traffic
ATT&CK Techniques
- T1110.001
- T1110.004
Created: 2025-02-28