heroui logo

Azure AD Multiple AppIDs and UserAgents Authentication Spike

Splunk Security Content

View Source
Summary
This analytical rule detects abnormal authentication patterns in Azure Active Directory (AD), focusing specifically on user accounts exhibiting high activity within a brief timeframe. It identifies instances where a single user has over 8 authentication attempts across 3 or more unique application IDs and 5 or more different user agents. Given the potential threat of an adversary probing multi-factor authentication (MFA) requirements, such behavior may indicate a compromised account, raising the possibility of further exploitation, lateral movement, or data exfiltration. The rule relies on Azure AD audit logs to implement statistical thresholds on authentication events, highlighting the importance of prompt detection and response to mitigate risks effectively.
Categories
  • Cloud
  • Identity Management
  • Azure
Data Sources
  • User Account
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1078
Created: 2024-11-14