
Summary
This detection rule focuses on identifying failed attempts to exchange refresh tokens in the Auth0 authentication system. Threat actors often aim to reuse or exchange stolen refresh tokens to gain unauthorized access without needing to re-authenticate. The rule captures events indicative of such activity through specific error messages associated with failed exchanges of refresh tokens. This could point to potential token theft or session hijacking attempts, where attackers are trying to bypass normal authentication controls. The logic implemented utilizes Splunk to gather relevant authentication data and filter for specific event types that indicate failed refresh token exchanges. If such events occur, they are logged with pertinent metadata such as time, host, user, and geographical location, potentially aiding in identifying compromised accounts or systems. The rule aligns with the credential access technique of stealing application access tokens as per MITRE ATT&CK (T1528).
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1528
Created: 2025-02-28