
Summary
The rule detects instances of failed OIDC (OpenID Connect) Back-Channel Logout attempts using data from Auth0 logs. Threat actors may exploit weaknesses in this logout process to maintain unauthorized access to resources or to disrupt user session termination effectively. By monitoring for specific log events, this rule identifies scenarios where logout requests do not succeed, indicating potential misconfigurations, service disruptions, or malicious activities aimed at circumventing session revocation. The detection is based on log ingestion through the `get_authentication_data_auth0` method and looks for keywords such as 'oidc_backchannel_logout_failed' or 'Failed OIDC Back-Channel Logout request'. The results are then filtered and organized by user and time, providing a clear view of logout failures that need attention. This proactive stance helps identify vulnerabilities in session management that could be exploited by attackers and ensures timely responses to abnormal logout behavior.
Categories
- Cloud
- Application
- Identity Management
Data Sources
- User Account
- Application Log
- Cloud Service
ATT&CK Techniques
- T1078
Created: 2025-02-28