
Summary
The 'Privileged Account Brute Force' rule identifies and alerts on potential brute force attacks targeting privileged accounts, specifically those with 'admin' in their usernames. The rule uses EQL (Event Query Language) to track multiple consecutive failed logon attempts from the same source IP address within a short timeframe (max span of 10 seconds). This behavior is indicative of brute force or password guessing attacks, especially if they come from external or suspicious IPs. The rule is designed for Windows environments, monitoring logs from various sources such as 'winlogbeat-*', 'logs-system.security*', and 'logs-windows.forwarded*'. When triggered, it suggests a series of investigative steps, including examining the failure reason codes, investigating the source IP, and identifying the context of the involved accounts. Potential false positives can occur due to misconfigurations or infrastructure issues, so careful examination is warranted. The rule emphasizes the importance of rapid response, including incident isolation, credential resets, and comprehensive malware scans, especially for accounts that may have been compromised. For effective implementation, a custom ingest pipeline may be necessary to ensure metadata is accurately captured and processed.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- User Account
- Logon Session
- Application Log
- Network Traffic
- Process
ATT&CK Techniques
- T1110
- T1110.001
- T1110.003
Created: 2020-08-29