
Summary
This detection rule focuses on monitoring excessive failed attempts to enter a recovery code in Auth0, which can be indicative of an attacker trying to bypass multi-factor authentication (MFA) or unauthorized access attempts. Such repeated failures are a red flag since they suggest that a malicious actor may be trying to gain unauthorized access by guessing or manipulating the recovery process for an account. The rule specifically tracks events labeled as 'gd_recovery_rate_limit_exceed', capturing instances where a user has entered an incorrect recovery code multiple times. By analyzing logs from authentication events in Splunk, it extracts important fields such as session ID, event type, action, user, source IP, and user agent. The data is aggregated over time, allowing security teams to identify potential brute-force attacks or other malicious activities surrounding MFA recovery processes, thus aiding in proactive security measures to protect user accounts.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1078
Created: 2025-02-28