heroui logo

Auth0: Attempted Use of Expired Token

Anvilogic Forge

View Source
Summary
This detection rule identifies potential abuse of expired authentication tokens in an Auth0 environment. Threat actors may exploit expired tokens to attempt unauthorized access by using valid credentials or refreshing tokens from different IP addresses. The rule specifically looks for events where access tokens are successfully used after they have expired, indicated by log entries containing 'JWT expired'. By monitoring these authentication logs for instances where multiple access attempts from different IP addresses occur within an hour, it raises the suspicion that an attacker might be leveraging stolen session tokens to maintain persistent access to the system. The logic utilizes Splunk's capabilities to filter and group the authentication event data based on user activity, allowing analysts to quickly identify patterns indicative of potential credential theft or unauthorized access attempts. The underlying technique classifications (T1528 and T1078) highlight the methods of credential access and initial access that this attack vector employs.
Categories
  • Identity Management
  • Cloud
  • Web
Data Sources
  • Application Log
  • User Account
ATT&CK Techniques
  • T1528
  • T1078
Created: 2024-02-09