heroui logo

Windows Multiple Users Remotely Failed To Authenticate From Host

Splunk Security Content

View Source
Summary
The analytic rule identifies instances where a single source host failed to authenticate against a remote host for more than 30 unique user accounts. This is indicative of potential password spraying attacks—where attackers attempt to exploit weak or common passwords across multiple accounts. Utilizing Windows Event Log 4625 with Logon Type 3 (for remote authentication), this detection method enables security teams to identify abnormal authentication failure patterns that could lead to initial access or privilege escalation in an Active Directory environment. Confirmed malicious activities based on this detection could result in unauthorized access to systems and data breaches, making it essential for proactive monitoring and swift incident response in secure environments.
Categories
  • Windows
  • Endpoint
  • Identity Management
Data Sources
  • Windows Registry
  • Windows Registry
  • Logon Session
ATT&CK Techniques
  • T1110
  • T1110.003
Created: 2024-11-13