heroui logo

Windows Unusual Count Of Users Remotely Failed To Auth From Host

Splunk Security Content

View Source
Summary
The 'Windows Unusual Count Of Users Remotely Failed To Auth From Host' detection rule identifies potentially malicious activity involving multiple failed authentication attempts from various user accounts against a specific host in a Windows environment. This behavior can suggest a password spraying attack, where an attacker attempts to gain unauthorized access by systematically trying to log in with multiple credentials. The rule analyzes Windows Event Log 4625 entries, specifically those related to remote logon attempts (Logon Type 3). The calculated statistics of distinct usernames failing to authenticate over specified time intervals provides insights into unusual patterns, aiding security teams in detecting potential threats. The analytic not only highlights high-risk events but also incorporates context by linking activities to the relevant MITRE ATT&CK framework techniques, thereby assisting in prioritization and response efforts.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
ATT&CK Techniques
  • T1110
  • T1110.003
Created: 2024-11-13