heroui logo

Salesforce OAuth Credential Abuse Detection

Panther Rules

View Source
Summary
The Salesforce OAuth Credential Abuse Detection rule focuses on identifying potential abuses of OAuth credentials within Salesforce, particularly concerning API access facilitated by OAuth tokens. This detection mechanism addresses critical scenarios such as the compromise of OAuth tokens either through theft or leakage, replay attacks, and patterns of excessive API usage that may imply automated exploitation. Noteworthy indicators include failed attempts to refresh tokens (which may suggest brute force attacks) and unauthorized revocations of tokens, both of which are significant in evaluating the security posture of OAuth operations. This rule dynamically adjusts its severity based on event types, interpreting revocations and failed OAuth operations as potential compromise or attack attempts. Consequently, by analyzing distinct security event logs—like token revocations, refresh failures, and unusual API utilization patterns—this rule provides essential evidence for interpreting current threats and forming appropriate responses, including token revocation and user credential resets.
Categories
  • Cloud
  • Identity Management
  • Application
Data Sources
  • User Account
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1528
  • T1110
  • T1550
  • T1020
Created: 2026-01-23