
Summary
This detection rule identifies potential credential brute-force attacks on user accounts in Auth0 by monitoring for multiple consecutive failed login attempts. It specifically looks for five or more authentication failures for a single user within a five-minute window, utilizing authentication logs sourced from the system. The logic is implemented using Splunk, where it retrieves authentication data and filters for failed login events, summarizing the occurrences by user and time. By examining patterns in failed login events, security teams can identify abnormal behavior indicative of an attacker trying to exploit authentication mechanisms or probing for valid credentials.
Categories
- Identity Management
- Cloud
- Web
Data Sources
- User Account
- Application Log
- Cloud Service
ATT&CK Techniques
- T1110
Created: 2024-02-09