
Summary
This rule is designed to detect password spraying attacks on Windows systems, where adversaries attempt to gain unauthorized access by using a few common passwords across multiple accounts. The detection is based on Windows event logs, specifically looking for failed logon attempts denoted by the event ID 4625. The logic processes logs by retrieving endpoint data, filtering for relevant events, and counting distinct users experiencing failed logins from the same source. It identifies a possible attack when more than two distinct user accounts fail to log in, suggesting that an attacker is trying to compromise multiple accounts with the same password or a small set of passwords. The rule is associated with the technique of credential access through brute force attacks, specifically password spraying, reflecting tactics used by threat actor groups like Volt Typhoon and software associations like Conti.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Application Log
- Logon Session
ATT&CK Techniques
- T1110.003
Created: 2024-02-09