heroui logo

Okta: Multiple OKTA push requests

Anvilogic Forge

View Source
Summary
This detection rule is designed to identify potential security incidents involving Okta-based authentication processes. Specifically, it analyzes logs generated by Okta to detect when a user receives an unusually high number of push authentication requests within a short timeframe, which may indicate unauthorized access attempts or credential abuse. The rule applies a Splunk query to extract relevant data, focusing on push verification events and aggregating results per user. The rule works by checking for instances where more than four push notifications are sent within a one-second interval, which is considered anomalous and could signify coercion or an automated attack against user accounts. By monitoring such behavior, this rule enables organizations to respond proactively to possible authentication abuse and enforce multi-factor authentication more effectively to safeguard user identities.
Categories
  • Identity Management
  • Cloud
Data Sources
  • Application Log
ATT&CK Techniques
  • T1078
Created: 2024-02-09