
Summary
This rule is designed to detect successful access token exchanges related to Auth0 authentication processes. Threat actors may exploit stolen credentials or session tokens to obtain access tokens by utilizing various forms of authentication, such as passwords, one-time passwords (OTPs), recovery codes, or refresh tokens. The detection logic leverages multiple event types associated with successful exchanges of these authentication factors for access tokens. The rule primarily operates by querying authentication logs for specified event types that indicate either legitimate access or potentially malicious attempts to access user accounts. The analysis not only helps in identifying potential unauthorized access but also aids in monitoring legitimate user behaviors closely associated with access token exchanges. Understanding the context of these exchanges is crucial for assessing whether the authenticated access was an intended action or a malicious attempt. The rule is particularly important for organizations utilizing Auth0 for authentication, allowing them to examine and respond to any suspicious authentication activity that could indicate credential compromise or session hijacking.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
- Web Credential
ATT&CK Techniques
- T1078
Created: 2025-02-28