heroui logo

Auth0: MFA Notification Failure

Anvilogic Forge

View Source
Summary
This detection rule focuses on identifying instances where multi-factor authentication (MFA) notifications fail within the Auth0 service, which can be indicative of both malicious activity and service disruption. Attackers may exploit these failures by probing MFA mechanisms to find vulnerabilities in authentication flows, or they may occur due to intentional or unintentional blocking by security policies or service limitations. The rule is designed to monitor for logs that exhibit characteristics of failure in sending either push notifications or SMS messages as part of MFA processes. Specifically, it captures events of notification failures using specific keywords, allowing security teams to quickly identify potential attempts to compromise accounts through MFA bypass methods. By examining the collected data—including timestamps, host, user, and geographic information—analysts can assess whether these failures represent a coordinated attack or are related to other operational issues within the authentication process.
Categories
  • Identity Management
  • Cloud
  • Application
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1621
Created: 2025-02-28