
Summary
This rule is designed to detect sign-up attempts using passwords that have been previously leaked in data breaches. By monitoring authentication logs, the rule identifies when attackers try to create new accounts with these compromised credentials, reflecting a technique often associated with credential stuffing or the reuse of passwords. The Splunk logic processes events tagged with 'signup_pwd_leak', filtering them to include relevant information about the attempted sign-ups such as the timestamp, user details, geographical location, source IP, and associated signatures. The data can provide insight into unauthorized access attempts and helps organizations to mitigate the risk associated with leaked credentials. The detection rule targets incidents where a user may unknowingly reuse a leaked password or where an attacker actively tests out compromised details to gain access to an account. Overall, this rule serves as an important preventative measure to enhance account security and user awareness against potential exploits.
Categories
- Identity Management
- Cloud
- Web
Data Sources
- User Account
- Application Log
- Cloud Service
ATT&CK Techniques
- T1110.004
- T1078
Created: 2025-02-28