heroui logo

Auth0: High volume auth attempts

Anvilogic Forge

View Source
Summary
This detection rule focuses on identifying high-volume authentication attempts against Auth0's Authentication or Management APIs, which may indicate malicious activity such as brute-force attacks, automated scraping, or denial-of-service (DoS) attacks. The logic leverages Splunk to retrieve authentication-related events and filter instances where the maximum number of API requests is hit within a specific time frame. By employing statistical functions, the rule captures occurrences of API limit events and compiles relevant metadata for analysis, including session IDs, event types, user identities, source IPs, and HTTP user agents. This visibility into authentication activities allows security teams to respond to potential threats by recognizing patterns linked to credential abuse or unauthorized access attempts.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1078
  • T1110
Created: 2025-02-28