
Summary
This rule is designed to detect events related to native social login attempts using Auth0, which is a platform providing identity management solutions. Threat actors may leverage compromised third-party social media accounts to bypass traditional authentication methods, enabling unauthorized access to user accounts. The rule monitors successful authentication events classified under 'Native Social Login'. By analyzing these events, the rule can distinguish between legitimate user logins and possible account takeovers executed by malicious entities. It utilizes the `get_authentication_data_auth0` function in Splunk to retrieve relevant authentication logs and then applies a filter to isolate events related specifically to native social login activities.
Categories
- Identity Management
- Cloud
- Web
- Endpoint
Data Sources
- User Account
- Application Log
- Web Credential
ATT&CK Techniques
- T1078
Created: 2025-02-28