heroui logo

Auth0: Multiple Failed Logins for Single Account

Anvilogic Forge

View Source
Summary
This detection rule identifies potential credential brute-force attacks on user accounts in Auth0 by monitoring for multiple consecutive failed login attempts. It specifically looks for five or more authentication failures for a single user within a five-minute window, utilizing authentication logs sourced from the system. The logic is implemented using Splunk, where it retrieves authentication data and filters for failed login events, summarizing the occurrences by user and time. By examining patterns in failed login events, security teams can identify abnormal behavior indicative of an attacker trying to exploit authentication mechanisms or probing for valid credentials.
Categories
  • Identity Management
  • Cloud
  • Web
Data Sources
  • User Account
  • Application Log
  • Cloud Service
ATT&CK Techniques
  • T1110
Created: 2024-02-09